net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:2003 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html | mailing list third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:1965 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/99928 | vdb entry third party advisory |
http://www.debian.org/security/2017/dsa-3981 | third party advisory vendor advisory |
https://source.android.com/security/bulletin/pixel/2017-11-01 | third party advisory |
http://seclists.org/bugtraq/2017/Jul/30 | third party advisory mailing list |
https://access.redhat.com/errata/RHSA-2019:1170 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:1190 | third party advisory vendor advisory |