CVE-2017-12762 - Linux kernel: buffer overflow in ISDN linux driver

In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a
local buffer of constant size using strcpy without a length check which can
cause a buffer overflow. Patched in the Linux kernel 4.9-stable tree,
4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.

Reference:
https://patchwork.kernel.org/patch/9880041/

Hozzászólások

strcpy
without check
2017-ben
a linux kernel

Milyen szigorú code review van, ha egy ilyen átcsúszik simán.