Логотип exploitDog
bind:CVE-2023-54139
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-54139

Количество 4

Количество 4

ubuntu логотип

CVE-2023-54139

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tracing/user_events: Ensure write index cannot be negative The write index indicates which event the data is for and accesses a per-file array. The index is passed by user processes during write() calls as the first 4 bytes. Ensure that it cannot be negative by returning -EINVAL to prevent out of bounds accesses. Update ftrace self-test to ensure this occurs properly.

EPSS: Низкий
nvd логотип

CVE-2023-54139

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tracing/user_events: Ensure write index cannot be negative The write index indicates which event the data is for and accesses a per-file array. The index is passed by user processes during write() calls as the first 4 bytes. Ensure that it cannot be negative by returning -EINVAL to prevent out of bounds accesses. Update ftrace self-test to ensure this occurs properly.

EPSS: Низкий
debian логотип

CVE-2023-54139

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: t ...

EPSS: Низкий
github логотип

GHSA-8m37-c7gh-2jmr

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tracing/user_events: Ensure write index cannot be negative The write index indicates which event the data is for and accesses a per-file array. The index is passed by user processes during write() calls as the first 4 bytes. Ensure that it cannot be negative by returning -EINVAL to prevent out of bounds accesses. Update ftrace self-test to ensure this occurs properly.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-54139

In the Linux kernel, the following vulnerability has been resolved: tracing/user_events: Ensure write index cannot be negative The write index indicates which event the data is for and accesses a per-file array. The index is passed by user processes during write() calls as the first 4 bytes. Ensure that it cannot be negative by returning -EINVAL to prevent out of bounds accesses. Update ftrace self-test to ensure this occurs properly.

0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2023-54139

In the Linux kernel, the following vulnerability has been resolved: tracing/user_events: Ensure write index cannot be negative The write index indicates which event the data is for and accesses a per-file array. The index is passed by user processes during write() calls as the first 4 bytes. Ensure that it cannot be negative by returning -EINVAL to prevent out of bounds accesses. Update ftrace self-test to ensure this occurs properly.

0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2023-54139

In the Linux kernel, the following vulnerability has been resolved: t ...

0%
Низкий
около 2 месяцев назад
github логотип
GHSA-8m37-c7gh-2jmr

In the Linux kernel, the following vulnerability has been resolved: tracing/user_events: Ensure write index cannot be negative The write index indicates which event the data is for and accesses a per-file array. The index is passed by user processes during write() calls as the first 4 bytes. Ensure that it cannot be negative by returning -EINVAL to prevent out of bounds accesses. Update ftrace self-test to ensure this occurs properly.

0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу