Описание
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
Ссылки
- ExploitIssue TrackingThird Party Advisory
- ExploitThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:libbpf_project:libbpf:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:libbpf_project:libbpf:0.6.1:*:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.00252
Низкий
6.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 6.5
ubuntu
около 4 лет назад
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
CVSS3: 4.5
redhat
около 4 лет назад
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
CVSS3: 6.5
debian
около 4 лет назад
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in _ ...
github
около 4 лет назад
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
EPSS
Процентиль: 48%
0.00252
Низкий
6.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-787