vulnerability
SUSE: CVE-2017-12193: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | Nov 18, 2017 | Dec 4, 2017 | Feb 4, 2022 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Nov 18, 2017
Added
Dec 4, 2017
Modified
Feb 4, 2022
Description
The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations.
Solution(s)
suse-upgrade-kernel-azure-basesuse-upgrade-kernel-defaultsuse-upgrade-kernel-default-extrasuse-upgrade-kernel-default-mansuse-upgrade-kernel-devel-azuresuse-upgrade-kernel-docssuse-upgrade-kernel-obs-buildsuse-upgrade-kernel-source-azure
References
- SUSE-SUSE-SU-2017:3210-1
- SUSE-SUSE-SU-2017:3249-1
- SUSE-SUSE-SU-2017:3398-1
- SUSE-SUSE-SU-2017:3410-1
- SUSE-SUSE-SU-2018:0213-1
- BID-101678
- REDHAT-RHSA-2018:0151
- UBUNTU-USN-3507-1
- UBUNTU-USN-3507-2
- UBUNTU-USN-3509-1
- UBUNTU-USN-3509-2
- UBUNTU-USN-3509-3
- UBUNTU-USN-3509-4
- UBUNTU-USN-3698-1
- UBUNTU-USN-3698-2
- NVD-CVE-2017-12193

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.