Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 10 Aug 2017 09:24:16 -0600
From: Annie Cherkaev <annie.cherk@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2017-12762: buffer overflow in ISDN linux driver

Description:
In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a
local buffer of constant size using strcpy without a length check which can
cause a buffer overflow. Patched in the Linux kernel 4.9-stable tree,
4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.

Reference:
https://patchwork.kernel.org/patch/9880041/

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ