Svi
Pretraži prema proizvođaču
Pretraži prema CWE oznaci
O usluzi
Pretplate
Jezik
hr
en
CVE-2023-54312 - CERT CVE
CVE-2023-54312
ID
CVE-2023-54312
Sažetak
In the Linux kernel, the following vulnerability has been resolved: samples/bpf: Fix buffer overflow in tcp_basertt Using sizeof(nv) or strlen(nv)+1 is correct.
Reference
https://git.kernel.org/stable/c/56c25f2763a16db4fa1b486e6a21dc246cd992bd
https://git.kernel.org/stable/c/7c08d1b0d1f75117cf82aeaef49ba9f861b3fb59
https://git.kernel.org/stable/c/bd3e880dce27d225598730d2bbb3dc05b443af22
https://git.kernel.org/stable/c/cf7514fedc25675e68b74941df28a883951e70fd
https://git.kernel.org/stable/c/dfc004688518d24159606289c74d0c4e123e6436
https://git.kernel.org/stable/c/e92f61e0701ea780e57e1be8dbd1fbec5f42c09e
https://git.kernel.org/stable/c/f394d204d64095d72ad9f03ff98f3f3743bf743a
https://git.kernel.org/stable/c/f4dea9689c5fea3d07170c2cb0703e216f1a0922
CVSS
Base:
0.0
Impact:
None
Exploitability:
None
Pristup
Vektor
Složenost
Autentikacija
None
None
None
Impact
Povjerljivost
Cjelovitost
Dostupnost
None
None
None
CVSS vektor
None
Zadnje važnije ažuriranje
31-12-2025 - 20:42
Objavljeno
30-12-2025 - 13:16