Описание
In the Linux kernel, the following vulnerability has been resolved:
samples/bpf: Fix buffer overflow in tcp_basertt
Using sizeof(nv) or strlen(nv)+1 is correct.
In the Linux kernel, the following vulnerability has been resolved:
samples/bpf: Fix buffer overflow in tcp_basertt
Using sizeof(nv) or strlen(nv)+1 is correct.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-54312
- https://git.kernel.org/stable/c/56c25f2763a16db4fa1b486e6a21dc246cd992bd
- https://git.kernel.org/stable/c/7c08d1b0d1f75117cf82aeaef49ba9f861b3fb59
- https://git.kernel.org/stable/c/bd3e880dce27d225598730d2bbb3dc05b443af22
- https://git.kernel.org/stable/c/cf7514fedc25675e68b74941df28a883951e70fd
- https://git.kernel.org/stable/c/dfc004688518d24159606289c74d0c4e123e6436
- https://git.kernel.org/stable/c/e92f61e0701ea780e57e1be8dbd1fbec5f42c09e
- https://git.kernel.org/stable/c/f394d204d64095d72ad9f03ff98f3f3743bf743a
- https://git.kernel.org/stable/c/f4dea9689c5fea3d07170c2cb0703e216f1a0922
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: samples/bpf: Fix buffer overflow in tcp_basertt Using sizeof(nv) or strlen(nv)+1 is correct.
In the Linux kernel, the following vulnerability has been resolved: samples/bpf: Fix buffer overflow in tcp_basertt Using sizeof(nv) or strlen(nv)+1 is correct.
In the Linux kernel, the following vulnerability has been resolved: s ...
Уязвимость функции bpf_basertt() модуля samples/bpf/tcp_basertt_kern.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS