In the Linux kernel, the following vulnerability has been resolved:
crypto: scomp - fix req->dst buffer overflow
The req->dst buffer size should be checked before copying from the
scomp_scratch->dst to avoid req->dst buffer overflow problem.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2024-03-18 11:15
Updated : 2025-02-27 03:23
NVD link : CVE-2023-52612
Mitre link : CVE-2023-52612
CVE.ORG link : CVE-2023-52612
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
