CVE-2017-1000363
Description
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel lp.c missing bounds check in "lp=none" parsing allows out-of-bounds write via many kernel command-line arguments, potentially leading to privilege escalation.
Vulnerability
The Linux kernel's drivers/char/lp.c contains an out-of-bounds write vulnerability in the lp_setup() function. The static integer parport_ptr is not bounded when handling "lp=none" arguments from the kernel command line, allowing an attacker to overflow the parport_nr[] array if more than LP_NO such arguments are supplied. The bug exists in Linux kernels up to and including 4.12-rc1, affecting all versions from 2.2.x through 4.12-rc1 [1].
Exploitation
An adversary must be able to control or influence the kernel command line, which can occur in Secure Boot environments due to bootloader vulnerabilities (e.g., CVE-2016-10277 on Google Nexus 6). By appending many (>LP_NO) "lp=none" arguments, the attacker triggers the out-of-bounds write when parport_ptr exceeds the array size. No additional authentication or user interaction is required beyond kernel command line control [1].
Impact
Successful exploitation results in an out-of-bounds write to kernel memory. While the advisory [1] does not detail a specific exploit primitive, arbitrary writes to kernel memory can lead to denial of service, information disclosure, or privilege escalation, depending on the overwritten data structure. The vulnerability is rated CVSS v3 7.8 (High) and can compromise system integrity and confidentiality.
Mitigation
The patch has been committed to the mainline kernel tree and is included in Linux 4.12-rc2. Stable releases 3.18, 4.4, 4.9, and 4.11 also contain the fix. Users should update to a patched kernel version. No workaround exists without applying the patch [1].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
68- osv-coords68 versionspkg:rpm/suse/cluster-network&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/cluster-network&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/drbd&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/drbd-kmp&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/drbd-kmp&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/gfs2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/gfs2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-bigsmp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-rt_trace&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-xen&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/ocfs2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/ocfs2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4
< 1.4-2.32.2.14+ 67 more
- (no CPE)range: < 1.4-2.32.2.14
- (no CPE)range: < 1.4-2.32.2.14
- (no CPE)range: < 8.4.4-0.27.2.1
- (no CPE)range: < 8.4.4-0.27.2.13
- (no CPE)range: < 8.4.4-0.27.2.13
- (no CPE)range: < 2-0.24.2.14
- (no CPE)range: < 2-0.24.2.14
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.0.101-108.7.2
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-0.47.106.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-8.1
- (no CPE)range: < 1.6-0.28.3.4
- (no CPE)range: < 1.6-0.28.3.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.debian.org/security/2017/dsa-3945nvdThird Party Advisory
- www.securityfocus.com/bid/98651nvdThird Party AdvisoryVDB Entry
- alephsecurity.com/vulns/aleph-2017023nvdThird Party Advisory
News mentions
0No linked articles in our index yet.