xt_TCPMSS buffer overflow bug
Bug #1739765 reported by
Denys Fedoryshchenko
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Bug was reported in LKML here: https:/
In few words - corrupted packet might be used to modify memory at router who has xt_TCPMSS used as iptables action.
This is really nasty bug, and can be triggered remotely by malicious person on anything that usually use this iptables action (PPPoE/PPTP-enabled ISP or VPN provider, for example).
This bug existed for several years, i guess.
I waited for a while since April, as it's already pushed to stable, and probably all distributions have it updated, so now it's time to do bugreport, to make sure it is really fixed everywhere.
Maybe worth to assign CVE for it?
CVE References
To post a comment you must log in.
Hello Denys,
Are fixes for this bug available?
Did you discover this bug?
Have you, or someone else, filed for a CVE for this issue yet?
Thanks