First published: Thu Oct 12 2017(Updated: )
A flaw was found in the Linux kernels implementation of associative arrays introduced in 3.13. The Red Hat Enterprise Linux 7 kernel had back ported this functionality to the 3.10 kernels and was affected by this flaw. The flaw involved a null pointer dereference in assoc_array_apply_edit() due to incorrect node-splitting in assoc_array implementation. This did not affect all callers of of the associative array code, only those that would try todereference the assigned value, a kernel panic will occur. Upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b</a> Oss-security: <a href="http://seclists.org/oss-sec/2017/q4/181">http://seclists.org/oss-sec/2017/q4/181</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <4.13.11 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12193 is considered moderate due to the potential for a null pointer dereference.
To fix CVE-2017-12193, you should upgrade to a patched version of the Linux kernel beyond 4.13.11.
CVE-2017-12193 affects Linux kernel versions prior to 4.13.11, including backported versions in Red Hat Enterprise Linux 7.
The impact of CVE-2017-12193 is a potential system crash due to a null pointer dereference in the associative arrays implementation.
CVE-2017-12193 is particularly noted in the Red Hat Enterprise Linux 7 kernel but may affect other distributions using the vulnerable kernel versions.