Description
A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3791-1 | linux security update |
EUVD |
EUVD-2017-11779 | A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory. |
Ubuntu USN |
USN-3361-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3381-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3381-2 | Linux kernel (Trusty HWE) vulnerabilities |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Workstation
Subscribe
Enterprise Mrg
Subscribe
Rhel Extras Rt
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T14:02:07.208Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2618
No data.
Status : Modified
Published: 2018-07-27T19:29:00.267
Modified: 2024-11-21T03:23:50.630
Link: CVE-2017-2618
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN