In FreeBSD 12.1-STABLE before r356911, and 12.1-RELEASE before p5, insufficient checking in the cryptodev module allocated the size of a kernel buffer based on a user-supplied length allowing an unprivileged process to trigger a kernel panic.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:16.cryptodev.asc | vendor advisory |
https://security.netapp.com/advisory/ntap-20200518-0008/ | third party advisory |