Out-of-bounds Write Affecting kernel-uek-debug package, versions <0:2.6.39-400.297.12.el5uek
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE5-KERNELUEKDEBUG-2522693
- published 10 Apr 2022
- disclosed 17 Jul 2017
Introduced: 17 Jul 2017
CVE-2017-1000363 Open this link in a new tabHow to fix?
Upgrade Oracle:5
kernel-uek-debug
to version 0:2.6.39-400.297.12.el5uek or higher.
This issue was patched in ELSA-2017-3637
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-uek-debug
package and not the kernel-uek-debug
package as distributed by Oracle
.
See How to fix?
for Oracle:5
relevant fixed versions and status.
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.
References
- https://linux.oracle.com/cve/CVE-2017-1000363.html
- https://linux.oracle.com/errata/ELSA-2017-3595.html
- https://linux.oracle.com/errata/ELSA-2017-3636.html
- https://linux.oracle.com/errata/ELSA-2017-3637.html
- https://alephsecurity.com/vulns/aleph-2017023
- http://www.securityfocus.com/bid/98651
- http://www.debian.org/security/2017/dsa-3945