cvelist/2017/12xxx/CVE-2017-12193.json

153 lines
6.1 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2023-02-02 16:01:24 +00:00
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
2019-03-18 02:53:17 +00:00
"CVE_data_meta": {
"ID": "CVE-2017-12193",
2023-02-02 16:01:24 +00:00
"ASSIGNER": "secalert@redhat.com",
2019-03-18 02:53:17 +00:00
"STATE": "PUBLIC"
},
2023-02-02 16:01:24 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Linux kernel's implementation of associative arrays introduced in 3.13. This functionality was backported to the 3.10 kernels in Red Hat Enterprise Linux 7. The flaw involved a null pointer dereference in assoc_array_apply_edit() due to incorrect node-splitting in assoc_array implementation. This affects the keyring key type and thus key addition and link creation operations may cause the kernel to panic."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference",
"cweId": "CWE-476"
}
]
}
]
},
2019-03-18 02:53:17 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2023-02-02 16:01:24 +00:00
"vendor_name": "Red Hat",
2019-03-18 02:53:17 +00:00
"product": {
"product_data": [
{
2023-02-02 16:01:24 +00:00
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "0:3.10.0-693.17.1.rt56.636.el7",
"version_affected": "!"
},
{
"version_value": "0:3.10.0-693.17.1.el7",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise MRG 2",
2019-03-18 02:53:17 +00:00
"version": {
"version_data": [
{
2023-02-02 16:01:24 +00:00
"version_value": "1:3.10.0-693.17.1.rt56.604.el6rt",
"version_affected": "!"
2019-03-18 02:53:17 +00:00
}
]
}
}
]
2023-02-02 16:01:24 +00:00
}
2019-03-18 02:53:17 +00:00
}
]
}
},
"references": {
"reference_data": [
{
2023-02-02 16:01:24 +00:00
"url": "https://access.redhat.com/errata/RHSA-2018:0151",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:0151"
},
{
"url": "https://access.redhat.com/errata/RHSA-2018:0152",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:0152"
},
{
"url": "https://access.redhat.com/errata/RHSA-2018:0181",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:0181"
},
{
"url": "https://usn.ubuntu.com/3698-1/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/3698-1/"
2019-03-18 02:53:17 +00:00
},
{
2023-02-02 16:01:24 +00:00
"url": "https://usn.ubuntu.com/3698-2/",
"refsource": "MISC",
"name": "https://usn.ubuntu.com/3698-2/"
2019-03-18 02:53:17 +00:00
},
{
2023-02-02 16:01:24 +00:00
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b",
"refsource": "MISC",
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b"
2019-03-18 02:53:17 +00:00
},
{
2023-02-02 16:01:24 +00:00
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11",
"refsource": "MISC",
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11"
2019-03-18 02:53:17 +00:00
},
{
2023-02-02 16:01:24 +00:00
"url": "http://www.securityfocus.com/bid/101678",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/101678"
2019-03-18 02:53:17 +00:00
},
{
2023-02-02 16:01:24 +00:00
"url": "https://access.redhat.com/security/cve/CVE-2017-12193",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2017-12193"
2019-03-18 02:53:17 +00:00
},
{
2023-02-02 16:01:24 +00:00
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501215",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1501215"
2019-03-18 02:53:17 +00:00
},
{
2023-02-02 16:01:24 +00:00
"url": "https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b",
"refsource": "MISC",
"name": "https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b"
}
]
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Fan Wu (University of Hong Kong), Haoran Qiu (University of Hong Kong), Heming Cui (University of Hong Kong), and Shixiong Zhao (University of Hong Kong) for reporting this issue."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
2019-03-18 02:53:17 +00:00
}
]
}
}