You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
netfilter: nft_limit: reject configurations that cause integer overflow
jira VULN-8197
cve CVE-2024-26668
commit-author Florian Westphal <[email protected]>
commit c9d9eb9
upstream-diff Used `limit' struct instead of `priv' because of missing
369b6cb. Also added casts to `u64'
where appropriate as inspired by the RH's LTS 9.4 backport of this patch
embedded in 270e20b.
Reject bogus configs where internal token counter wraps around.
This only occurs with very very large requests, such as 17gbyte/s.
Its better to reject this rather than having incorrect ratelimit.
Fixes: d2168e8 ("netfilter: nft_limit: add per-byte limiting")
Signed-off-by: Florian Westphal <[email protected]>
Signed-off-by: Pablo Neira Ayuso <[email protected]>
(cherry picked from commit c9d9eb9)
Signed-off-by: Marcin Wcisło <[email protected]>
0 commit comments