vulnerability
SUSE: CVE-2017-7616: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Apr 10, 2017 | May 2, 2017 | Feb 4, 2022 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Apr 10, 2017
Added
May 2, 2017
Modified
Feb 4, 2022
Description
Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.
Solution(s)
suse-upgrade-cluster-md-kmp-defaultsuse-upgrade-cluster-network-kmp-defaultsuse-upgrade-dlm-kmp-defaultsuse-upgrade-gfs2-kmp-defaultsuse-upgrade-kernel-defaultsuse-upgrade-kernel-docssuse-upgrade-kernel-ec2suse-upgrade-kernel-ec2-develsuse-upgrade-kernel-ec2-extrasuse-upgrade-kernel-obs-buildsuse-upgrade-ocfs2-kmp-default
References
- SUSE-SUSE-SU-2017:1247-1
- SUSE-SUSE-SU-2017:1301-1
- SUSE-SUSE-SU-2017:1360-1
- SUSE-SUSE-SU-2017:1853-1
- SUSE-SUSE-SU-2017:1990-1
- SUSE-SUSE-SU-2017:2342-1
- SUSE-SUSE-SU-2017:2525-1
- BID-97527
- SECTRACK-1038503
- REDHAT-RHSA-2017:1842
- REDHAT-RHSA-2017:2077
- REDHAT-RHSA-2018:1854
- NVD-CVE-2017-7616
- DEBIAN-DLA-922-1
- UBUNTU-USN-3291-1
- UBUNTU-USN-3291-2
- UBUNTU-USN-3291-3
- UBUNTU-USN-3293-1
- UBUNTU-USN-3361-1
- UBUNTU-USN-3406-1
- UBUNTU-USN-3406-2

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.