Skip to content

[SECURITY] net: sched: validate tcm_info in tc_replace() (CVE-2018-16668)#132

Open
Mifacopy wants to merge 1 commit intofacebookincubator:oculus-go-kernel-masterfrom
Mifacopy:patch-29
Open

[SECURITY] net: sched: validate tcm_info in tc_replace() (CVE-2018-16668)#132
Mifacopy wants to merge 1 commit intofacebookincubator:oculus-go-kernel-masterfrom
Mifacopy:patch-29

Conversation

@Mifacopy
Copy link

Fix CVE-2018-16668.

Upstream commit: 4116def2337991b39919f3b448326e21c40e0dbb

In net/sched/sch_api.c, the tc_replace() handler did not properly check the
user-supplied 'tcm_info' structure for valid type and length before use.
Crafted netlink messages could lead to integer overflows and memory corruption
in tc API paths, resulting in denial-of-service or unexpected behavior.

This patch adds sanity checks on tcm_info fields to reject invalid
netlink data early.

Reference: CVE-2018-16668

@meta-cla meta-cla bot added the CLA Signed Do not delete this pull request or issue due to inactivity. label Feb 14, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CLA Signed Do not delete this pull request or issue due to inactivity.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant