Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3945 | Third Party Advisory |
http://www.securityfocus.com/bid/98651 | Third Party Advisory VDB Entry |
https://alephsecurity.com/vulns/aleph-2017023 | Third Party Advisory |
http://www.debian.org/security/2017/dsa-3945 | Third Party Advisory |
http://www.securityfocus.com/bid/98651 | Third Party Advisory VDB Entry |
https://alephsecurity.com/vulns/aleph-2017023 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3945 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/98651 - Third Party Advisory, VDB Entry | |
References | () https://alephsecurity.com/vulns/aleph-2017023 - Third Party Advisory |
Information
Published : 2017-07-17 13:18
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000363
Mitre link : CVE-2017-1000363
CVE.ORG link : CVE-2017-1000363
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write