{"id":"CVE-2017-7482","details":"In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.","modified":"2026-03-12T22:40:32.208685Z","published":"2018-07-30T14:29:02.990Z","related":["SUSE-SU-2017:2342-1","SUSE-SU-2017:2389-1","SUSE-SU-2017:2525-1","SUSE-SU-2017:2908-1","SUSE-SU-2017:2920-1","SUSE-SU-2017:3398-1","SUSE-SU-2017:3410-1","SUSE-SU-2018:0213-1"],"references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3945"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/99299"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1038787"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0641"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3927"},{"type":"FIX","url":"http://seclists.org/oss-sec/2017/q2/602"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7482"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f2f97656ada8d811d3c1bef503ced266fcd53a0"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.90"}]},{"events":[{"introduced":"3.3"},{"fixed":"3.10.108"}]},{"events":[{"introduced":"3.11"},{"fixed":"3.16.45"}]},{"events":[{"introduced":"3.17"},{"fixed":"3.18.59"}]},{"events":[{"introduced":"3.19"},{"fixed":"4.1.43"}]},{"events":[{"introduced":"4.2"},{"fixed":"4.4.75"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.35"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.11.8"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-7482.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}