Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-51823

Опубликовано: 11 авг. 2025
Источник: debian

Описание

libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libcspremovedpackage

Примечания

  • https://github.com/libcsp/libcsp/issues/850

  • https://github.com/libcsp/libcsp/pull/852

Связанные уязвимости

CVSS3: 6.5
ubuntu
28 дней назад

libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.

CVSS3: 6.5
nvd
28 дней назад

libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.

CVSS3: 6.5
github
28 дней назад

libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.