Out-of-Bounds Affecting torvalds/linux package, versions [3.18.0,4.12.8]


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.24% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-3004200
  • published26 Jan 2022
  • disclosed9 Aug 2017
  • creditUnknown

Introduced: 9 Aug 2017

CVE-2017-12762  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for torvalds/linux.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.

CVSS Base Scores

version 3.1