First published: Mon Jul 24 2017(Updated: )
net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=2.6.21<3.2.93 | |
Linux Linux kernel | >=3.3<3.10.108 | |
Linux Linux kernel | >=3.11<3.18.70 | |
Linux Linux kernel | >=3.19<4.1.45 | |
Linux Linux kernel | >=4.2<4.4.87 | |
Linux Linux kernel | >=4.5<4.9.48 | |
Linux Linux kernel | >=4.10<4.12.11 | |
debian/linux | 4.19.249-2 4.19.289-2 5.10.197-1 5.10.205-2 6.1.66-1 6.1.69-1 6.5.13-1 6.6.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.