Oval Definition:oval:com.ubuntu.xenial:def:20172618000
Revision Date:2018-07-27Version:1
Title:CVE-2017-2618 on Ubuntu 16.04 LTS (xenial) - low.
Description:A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory. It was discovered that SELinux in the Linux kernel did not properly handle empty writes to /proc/pid/attr. A local attacker could use this to cause a denial of service (system crash).
Family:unixClass:vulnerability
Status:Reference(s):CVE-2017-2618
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • The 'linux' package in xenial was vulnerable but has been fixed (note: '4.4.0-67.88').
  • OR The 'linux-aws' package in xenial was vulnerable but has been fixed (note: '4.4.0-1009.18').
  • OR NOT While related to the CVE in some way, the 'linux-azure' package in xenial is not affected (note: '4.11.0-1009.9').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed ESM criteria').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed now end-of-life').
  • OR NOT While related to the CVE in some way, the 'linux-gcp' package in xenial is not affected (note: '4.10.0-1004.4').
  • OR NOT While related to the CVE in some way, the 'linux-gke' package in xenial is not affected (note: '4.4.0-1003.3').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed now end-of-life').
  • OR The 'linux-hwe' package in xenial was vulnerable but has been fixed (note: '4.10.0-27.30~16.04.2').
  • OR The 'linux-hwe-edge' package in xenial was vulnerable but has been fixed (note: '4.10.0-27.30~16.04.2').
  • OR NOT While related to the CVE in some way, the 'linux-kvm' package in xenial is not affected (note: '4.4.0-1004.9').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed now end-of-life').
  • OR NOT While related to the CVE in some way, the 'linux-oem' package in xenial is not affected (note: '4.13.0-1008.9').
  • OR The 'linux-raspi2' package in xenial was vulnerable but has been fixed (note: '4.4.0-1048.55').
  • OR The 'linux-snapdragon' package in xenial was vulnerable but has been fixed (note: '4.4.0-1051.55').
  • BACK