A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3791-1 | linux security update |
EUVD |
EUVD-2017-11779 | A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory. |
Ubuntu USN |
USN-3361-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3381-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3381-2 | Linux kernel (Trusty HWE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T14:02:07.208Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2618
No data.
Status : Modified
Published: 2018-07-27T19:29:00.267
Modified: 2024-11-21T03:23:50.630
Link: CVE-2017-2618
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN