CVE-2023-54312Incorrect Calculation of Buffer Size in Linux

Severity
2.5LOW
No vector
EPSS
0.0%
top 86.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: samples/bpf: Fix buffer overflow in tcp_basertt Using sizeof(nv) or strlen(nv)+1 is correct.

Affected Packages4 packages

Linuxlinux/linux_kernel4.15.04.19.291+6
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxc890063e440456e75c2e70f6bcec3797f1771eb6cf7514fedc25675e68b74941df28a883951e70fd+8
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
samples/bpf: Fix buffer overflow in tcp_basertt2025-12-30
GHSA
GHSA-p36c-jp35-qgrh: In the Linux kernel, the following vulnerability has been resolved: samples/bpf: Fix buffer overflow in tcp_basertt Using sizeof(nv) or strlen(nv)+12025-12-30
OSV
CVE-2023-54312: In the Linux kernel, the following vulnerability has been resolved: samples/bpf: Fix buffer overflow in tcp_basertt Using sizeof(nv) or strlen(nv)+1 i2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: samples/bpf: Fix buffer overflow in tcp_basertt2025-12-30
Debian
CVE-2023-54312: linux - In the Linux kernel, the following vulnerability has been resolved: samples/bpf...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54312 Impact, Exploitability, and Mitigation Steps | Wiz