From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steffen Klassert Subject: Re: [PATCH] xfrm: policy: check policy direction value Date: Thu, 3 Aug 2017 13:05:47 +0200 Message-ID: <20170803110547.GL2631@secunet.com> References: <20170802175014.20582-1-vdronov@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Cc: Herbert Xu , "David S . Miller" , , , To: Vladis Dronov Return-path: Content-Disposition: inline In-Reply-To: <20170802175014.20582-1-vdronov@redhat.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org On Wed, Aug 02, 2017 at 07:50:14PM +0200, Vladis Dronov wrote: > The 'dir' parameter in xfrm_migrate() is a user-controlled byte which is used > as an array index. This can lead to an out-of-bound access, kernel lockup and > DoS. Add a check for the 'dir' value. > > This fixes CVE-2017-11600. > > References: https://bugzilla.redhat.com/show_bug.cgi?id=1474928 > Fixes: 80c9abaabf42 ("[XFRM]: Extension for dynamic update of endpoint address(es)") > Cc: # v2.6.21-rc1 > Reported-by: "bo Zhang" > Signed-off-by: Vladis Dronov Applied to the ipsec tree, thanks!