Логотип exploitDog
bind:CVE-2024-46764
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-46764

Количество 5

Количество 5

ubuntu логотип

CVE-2024-46764

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: bpf: add check for invalid name in btf_name_valid_section() If the length of the name string is 1 and the value of name[0] is NULL byte, an OOB vulnerability occurs in btf_name_valid_section() and the return value is true, so the invalid name passes the check. To solve this, you need to check if the first position is NULL byte and if the first character is printable.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2024-46764

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: bpf: add check for invalid name in btf_name_valid_section() If the length of the name string is 1 and the value of name[0] is NULL byte, an OOB vulnerability occurs in btf_name_valid_section() and the return value is true, so the invalid name passes the check. To solve this, you need to check if the first position is NULL byte and if the first character is printable.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2024-46764

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: bpf: add check for invalid name in btf_name_valid_section() If the length of the name string is 1 and the value of name[0] is NULL byte, an OOB vulnerability occurs in btf_name_valid_section() and the return value is true, so the invalid name passes the check. To solve this, you need to check if the first position is NULL byte and if the first character is printable.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2024-46764

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: b ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-324v-cwrv-qmqr

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: bpf: add check for invalid name in btf_name_valid_section() If the length of the name string is 1 and the value of name[0] is NULL byte, an OOB vulnerability occurs in btf_name_valid_section() and the return value is true, so the invalid name passes the check. To solve this, you need to check if the first position is NULL byte and if the first character is printable.

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-46764

In the Linux kernel, the following vulnerability has been resolved: bpf: add check for invalid name in btf_name_valid_section() If the length of the name string is 1 and the value of name[0] is NULL byte, an OOB vulnerability occurs in btf_name_valid_section() and the return value is true, so the invalid name passes the check. To solve this, you need to check if the first position is NULL byte and if the first character is printable.

CVSS3: 7.1
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-46764

In the Linux kernel, the following vulnerability has been resolved: bpf: add check for invalid name in btf_name_valid_section() If the length of the name string is 1 and the value of name[0] is NULL byte, an OOB vulnerability occurs in btf_name_valid_section() and the return value is true, so the invalid name passes the check. To solve this, you need to check if the first position is NULL byte and if the first character is printable.

CVSS3: 6
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-46764

In the Linux kernel, the following vulnerability has been resolved: bpf: add check for invalid name in btf_name_valid_section() If the length of the name string is 1 and the value of name[0] is NULL byte, an OOB vulnerability occurs in btf_name_valid_section() and the return value is true, so the invalid name passes the check. To solve this, you need to check if the first position is NULL byte and if the first character is printable.

CVSS3: 7.1
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-46764

In the Linux kernel, the following vulnerability has been resolved: b ...

CVSS3: 7.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-324v-cwrv-qmqr

In the Linux kernel, the following vulnerability has been resolved: bpf: add check for invalid name in btf_name_valid_section() If the length of the name string is 1 and the value of name[0] is NULL byte, an OOB vulnerability occurs in btf_name_valid_section() and the return value is true, so the invalid name passes the check. To solve this, you need to check if the first position is NULL byte and if the first character is printable.

CVSS3: 7.1
0%
Низкий
больше 1 года назад

Уязвимостей на страницу