CVE-2017-1000363

NameCVE-2017-1000363
DescriptionLinux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1099-1, DSA-3945-1
NVD severityhigh (attack range: local)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)wheezy3.2.78-1vulnerable
wheezy (security)3.2.93-1fixed
jessie3.16.43-2+deb8u2vulnerable
jessie (security)3.16.43-2+deb8u5fixed
stretch4.9.30-2+deb9u2fixed
stretch (security)4.9.30-2+deb9u5fixed
buster, sid4.12.13-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsource(unstable)4.9.30-1low
linuxsourcejessie3.16.43-2+deb8u3highDSA-3945-1
linuxsourcewheezy3.2.93-1highDLA-1099-1

Notes

Fixed by: https://git.kernel.org/linus/3e21f4af170bebf47c187c1ff8bf155583c9f3b1 (4.12-rc2)
https://alephsecurity.com/vulns/aleph-2017023

Search for package or bug name: Reporting problems