First published: Tue Dec 19 2017(Updated: )
A NULL pointer dereference was found in net/rds/rdma.c:__rds_rdma_map() function in the Linux kernel allowing local attackers to cause a system panic and a denial-of-service. References: <a href="https://patchwork.kernel.org/patch/10096441/">https://patchwork.kernel.org/patch/10096441/</a> <a href="https://xorl.wordpress.com/2017/12/18/linux-kernel-rdma-null-pointer-dereference/">https://xorl.wordpress.com/2017/12/18/linux-kernel-rdma-null-pointer-dereference/</a> <a href="http://seclists.org/oss-sec/2018/q1/191">http://seclists.org/oss-sec/2018/q1/191</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f3069c6d33f6ae63a1668737bc78aaaa51bff7ca">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f3069c6d33f6ae63a1668737bc78aaaa51bff7ca</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <4.14.7 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.