The cookie feature in the packet action API implementation in net/sched/act_api.c in the Linux kernel 4.11.x through 4.11-rc7 mishandles the tb nlattr array, which allows local users to cause a denial of service (uninitialized memory access and refcount underflow, and system hang or crash) or possibly have unspecified other impact via "tc filter add" commands in certain contexts. NOTE: this does not affect stable kernels, such as 4.10.x, from kernel.org.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://marc.info/?l=linux-netdev&m=149251041420195 | mailing list third party advisory patch |
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1682368 | issue tracking patch |
https://bugzilla.proxmox.com/show_bug.cgi?id=1351 | issue tracking patch |
http://marc.info/?l=linux-netdev&m=149200742616349 | mailing list third party advisory patch |
http://marc.info/?l=linux-netdev&m=149200746116365 | mailing list third party advisory patch |
http://marc.info/?l=linux-netdev&m=149251041420194 | mailing list third party advisory patch |
http://marc.info/?l=linux-netdev&m=149200746116366 | mailing list third party advisory patch |
http://www.securityfocus.com/bid/97969 | vdb entry |