Comment 28 for bug 1022012

Revision history for this message
In , Huzaifa (huzaifa-redhat-bugs) wrote :

Ok, after looking at the assembly dump, memcpy is protected by __memcpy_chk and since destlen is known at build time, __memcpy_chk() will catch the overflow and abort, so non exploitable and therefore only moderate impact.