Skip to content

[SECURITY] xfrm: policy: validate policy direction in xfrm_migrate() (CVE-2017-11600)#123

Open
Mifacopy wants to merge 1 commit intofacebookincubator:oculus-go-kernel-masterfrom
Mifacopy:patch-18
Open

[SECURITY] xfrm: policy: validate policy direction in xfrm_migrate() (CVE-2017-11600)#123
Mifacopy wants to merge 1 commit intofacebookincubator:oculus-go-kernel-masterfrom
Mifacopy:patch-18

Conversation

@Mifacopy
Copy link

Fix CVE-2017-11600.

Upstream commit: 7bab09631c2a303f87a7eb7e3d69e888673b9b7e

The 'dir' parameter in xfrm_migrate() is user-controlled and was used as an
array index without validating it against XFRM_POLICY_MAX. This could lead to
out-of-bounds access, kernel lockup, and denial-of-service via a crafted
XFRM_MSG_MIGRATE netlink message when CONFIG_XFRM_MIGRATE is enabled.

This patch adds a sanity check for 'dir' (dir >= XFRM_POLICY_MAX) and rejects
invalid values with -EINVAL.

Reference: CVE-2017-11600

@meta-cla meta-cla bot added the CLA Signed Do not delete this pull request or issue due to inactivity. label Feb 14, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CLA Signed Do not delete this pull request or issue due to inactivity.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant