The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/98731 | vdb entry third party advisory |
https://patchwork.ozlabs.org/patch/764880/ | broken link |
https://github.com/torvalds/linux/commit/232cd35d0804cc241eb887bb8d4d9b3b9881c64a | issue tracking third party advisory patch |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=232cd35d0804cc241eb887bb8d4d9b3b9881c64a | issue tracking third party advisory patch |
https://access.redhat.com/errata/RHSA-2017:2077 | vendor advisory |
http://www.debian.org/security/2017/dsa-3886 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:1842 | vendor advisory |