{"id":"CVE-2017-12762","details":"In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.","modified":"2026-03-15T22:23:35.187455Z","published":"2017-08-09T21:29:01.507Z","related":["SUSE-SU-2017:2525-1","SUSE-SU-2017:2694-1","SUSE-SU-2017:2798-1","SUSE-SU-2017:2799-1","SUSE-SU-2017:2800-1","SUSE-SU-2017:2801-1","SUSE-SU-2017:2802-1","SUSE-SU-2017:2803-1","SUSE-SU-2017:2804-1","SUSE-SU-2017:2805-1","SUSE-SU-2017:2806-1","SUSE-SU-2017:2807-1","SUSE-SU-2017:2809-1","SUSE-SU-2017:2811-1","SUSE-SU-2017:2813-1","SUSE-SU-2017:2816-1","SUSE-SU-2017:2908-1","SUSE-SU-2017:2920-1","SUSE-SU-2017:3265-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/100251"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3620-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3620-2/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/02/11/1"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/02/11/2"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/02/14/4"},{"type":"FIX","url":"https://patchwork.kernel.org/patch/9880041/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12762.json","unresolved_ranges":[{"events":[{"introduced":"3.18"},{"fixed":"3.18.64"}]},{"events":[{"introduced":"3.19"},{"last_affected":"4.4.80"}]},{"events":[{"introduced":"4.5"},{"last_affected":"4.9.41"}]},{"events":[{"introduced":"4.10"},{"last_affected":"4.12.5"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}