In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.2.90"
}
]
},
{
"events": [
{
"introduced": "3.3"
},
{
"fixed": "3.10.108"
}
]
},
{
"events": [
{
"introduced": "3.11"
},
{
"fixed": "3.16.45"
}
]
},
{
"events": [
{
"introduced": "3.17"
},
{
"fixed": "3.18.59"
}
]
},
{
"events": [
{
"introduced": "3.19"
},
{
"fixed": "4.1.43"
}
]
},
{
"events": [
{
"introduced": "4.2"
},
{
"fixed": "4.4.75"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.35"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.11.8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.0"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-7482.json"