Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parportptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parportnr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.
[
{
"events": [
{
"introduced": "2.6.12"
},
{
"fixed": "3.2.91"
}
]
},
{
"events": [
{
"introduced": "3.3"
},
{
"fixed": "3.10.106"
}
]
},
{
"events": [
{
"introduced": "3.11"
},
{
"fixed": "3.16.46"
}
]
},
{
"events": [
{
"introduced": "3.17"
},
{
"fixed": "3.18.55"
}
]
},
{
"events": [
{
"introduced": "3.19"
},
{
"fixed": "4.1.41"
}
]
},
{
"events": [
{
"introduced": "4.2"
},
{
"fixed": "4.4.70"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.30"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.11.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.12-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-1000363.json"