Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.
References
Link | Resource |
---|---|
https://alephsecurity.com/vulns/aleph-2017023 | Third Party Advisory |
http://www.securityfocus.com/bid/98651 | Third Party Advisory VDB Entry |
http://www.debian.org/security/2017/dsa-3945 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-07-17 06:18
Updated : 2023-01-17 13:03
NVD link : CVE-2017-1000363
Mitre link : CVE-2017-1000363
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
linux
- linux_kernel