-
CVE-2023-54139
- EPSS 0.03%
- Veröffentlicht 24.12.2025 13:06:54
- Zuletzt bearbeitet 29.12.2025 15:58:13
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: tracing/user_events: Ensure write index cannot be negative The write index indicates which event the data is for and accesses a per-file array. The index is passed by user processes during write() calls as the first 4 bytes. Ensure that it cannot be negative by returning -EINVAL to prevent out of bounds accesses. Update ftrace self-test to ensure this occurs properly.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
0489c2b2c3104b89f078dbcec8c744dfc157d3e9
Version
7f5a08c79df35e68f1a43033450c5050f12bc155
Status
affected
Version <
4fe46b5adf18e3dc606e62c9e6a0413398a17572
Version
7f5a08c79df35e68f1a43033450c5050f12bc155
Status
affected
Version <
fa7f2f5d1739452280c22727c4384a52b72ab5de
Version
7f5a08c79df35e68f1a43033450c5050f12bc155
Status
affected
Version <
cd98c93286a30cc4588dfd02453bec63c2f4acf4
Version
7f5a08c79df35e68f1a43033450c5050f12bc155
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.18
Status
affected
Version <
5.18
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.064 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|