First published: Mon Jul 24 2017(Updated: )
net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 4.19.249-2 4.19.289-2 5.10.197-1 5.10.205-2 6.1.66-1 6.1.69-1 6.5.13-1 6.6.9-1 | |
Linux kernel | >=2.6.21<3.2.93 | |
Linux kernel | >=3.3<3.10.108 | |
Linux kernel | >=3.11<3.18.70 | |
Linux kernel | >=3.19<4.1.45 | |
Linux kernel | >=4.2<4.4.87 | |
Linux kernel | >=4.5<4.9.48 | |
Linux kernel | >=4.10<4.12.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11600 has a medium severity rating due to its potential to cause a denial of service.
To fix CVE-2017-11600, ensure that your Linux kernel is upgraded to a version later than 4.12.3 that includes the necessary patches.
CVE-2017-11600 affects Linux kernel versions prior to 4.12.3 when CONFIG_XFRM_MIGRATE is enabled.
The risks associated with CVE-2017-11600 include potential denial of service and out-of-bounds memory access.
A temporary workaround for CVE-2017-11600 involves disabling the CONFIG_XFRM_MIGRATE option if it is not needed.