Wind River Support Network

HomeDefectsLIN9-7021
Fixed

LIN9-7021 : Security Advisory - linux - CVE-2017-7482

Created: Jun 29, 2018    Updated: Dec 3, 2018
Resolved Date: Jul 31, 2018
Found In Version: 9.0.0.16
Fix Version: 9.0.0.17
Severity: Standard
Applicable for: Wind River Linux 9
Component/s: Kernel

Description

When a kerberos 5 ticket is being decoded so that it can be loaded into an rxrpc-type key, the length of a variable-length field is checked to make sure that it's not going to overrun the allocated buffer space. The data is padded to the nearest four-byte boundary and the code doesn't check for this extra four-byte aligned padding.  This can lead to the size-remaining variable wrapping and the data pointer accessing or reading past the end of the buffer.  The read functionality could allow for a 3 byte infoleak and the write flaw could allow for an uncontrolled 3 byte write to kernels slab memory.  This could lead to memory corruption and possible privilege escalation although no known exploit exists at the time of writing.

https://nvd.nist.gov/vuln/detail/CVE-2017-7482 

Other Downloads


CVEs


Live chat
Online