Описание
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1.0.1-2ubuntu1 |
| esm-apps/focal | not-affected | code not present |
| focal | not-affected | code not present |
| hirsute | ignored | end of life |
| impish | ignored | end of life |
| jammy | not-affected | code not present |
| kinetic | released | 0.8.0-1ubuntu22.10.1 |
| trusty | ignored | end of standard support |
| upstream | needs-triage | |
| xenial | ignored | end of standard support |
Показывать по
EPSS
4.3 Medium
CVSS2
6.5 Medium
CVSS3
Связанные уязвимости
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in _ ...
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
EPSS
4.3 Medium
CVSS2
6.5 Medium
CVSS3