Re: [Coverity] Untrusted user data in kernel

From: Pavel Machek
Date: Fri Dec 17 2004 - 10:12:11 EST


Hi!

> This at least needs CAP_NET_ADMIN.

Hmm, but that means that CAP_NET_ADMIN implies all other capabilities,
unless you fix this.

Pavel

> > TAINTED variable "((tmp).num_counters * 16)" was passed to a tainted
> > sink.
> >
> > 1161 counters = vmalloc(tmp.num_counters * sizeof(struct
> > ip6t_counters));
> > 1162 if (!counters) {
> > 1163 ret = -ENOMEM;
> > 1164 goto free_newinfo;
> > 1165 }
> >
> > TAINTED variable "((tmp).num_counters * 16)" was passed to a tainted
> > sink.
> >
> > 1166 memset(counters, 0, tmp.num_counters * sizeof(struct
> > ip6t_counters));


--
Boycott Kodak -- for their patent abuse against Java.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/