A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory.
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
Link | Tags |
---|---|
https://marc.info/?l=selinux&m=148588165923772&w=2 | patch mailing list third party advisory |
https://www.debian.org/security/2017/dsa-3791 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2618 | patch third party advisory issue tracking |
https://access.redhat.com/errata/RHSA-2017:0932 | third party advisory vendor advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c461cb727d146c9ef2d3e86214f498b78b7d125 | patch vendor advisory |
https://access.redhat.com/errata/RHSA-2017:0933 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2017:0931 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/96272 | third party advisory vdb entry |