libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
| Software | From | Fixed in |
|---|---|---|
| libcsp / libcsp | 2.0 | 2.0.x |