On 10.03.2011 19:12, Vasiliy Kulikov wrote: > Structures ipt_replace, compat_ipt_replace, and xt_get_revision are > copied from userspace. Fields of these structs that are > zero-terminated strings are not checked. When they are used as argument > to a format string containing "%s" in request_module(), some sensitive > information is leaked to userspace via argument of spawned modprobe > process. > > The first and the third bugs were introduced before the git epoch; the > second was introduced in 2722971c (v2.6.17-rc1). To trigger the bug > one should have CAP_NET_ADMIN. Applied, thanks. -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html