Описание
libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/bionic | needs-triage | |
esm-apps/xenial | needs-triage | |
jammy | DNE | |
noble | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
6.5 Medium
CVSS3
Связанные уязвимости
libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() func ...
libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
6.5 Medium
CVSS3