CVE-2023-54312
Description
In the Linux kernel, the following vulnerability has been resolved:
samples/bpf: Fix buffer overflow in tcp_basertt
Using sizeof(nv) or strlen(nv)+1 is correct.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A buffer overflow in the Linux kernel's tcp_basertt BPF sample is fixed by correcting a sizeof/strlen usage.
Vulnerability
A buffer overflow vulnerability exists in the tcp_basertt BPF sample program within the Linux kernel. The root cause is an incorrect use of sizeof(nv) or strlen(nv)+1 when handling a buffer, leading to a potential out-of-bounds write [1].
Exploitation
The vulnerability is present in a sample BPF program, which may be used as a reference or included in custom builds. An attacker with the ability to trigger the sample program's execution (e.g., by loading and running the BPF program) could exploit the overflow. No special privileges beyond those needed to load BPF programs are required, but the attack surface is limited to systems where the sample is compiled and run [2].
Impact
Successful exploitation could allow an attacker to corrupt adjacent memory, potentially leading to a denial of service or, in some cases, arbitrary code execution within the kernel context. The exact impact depends on the memory layout and the data written beyond the buffer boundary [3].
Mitigation
The fix has been applied in the Linux kernel stable tree via commits that correct the buffer size calculation. Users are advised to update to a kernel version containing the fix, or to avoid using the vulnerable sample program if a patch cannot be applied immediately [4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8cf7514fedc25f394d204d640bd3e880dce27e92f61e0701e56c25f2763a1dfc0046885187c08d1b0d1f7f4dea9689c5fVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/56c25f2763a16db4fa1b486e6a21dc246cd992bdnvd
- git.kernel.org/stable/c/7c08d1b0d1f75117cf82aeaef49ba9f861b3fb59nvd
- git.kernel.org/stable/c/bd3e880dce27d225598730d2bbb3dc05b443af22nvd
- git.kernel.org/stable/c/cf7514fedc25675e68b74941df28a883951e70fdnvd
- git.kernel.org/stable/c/dfc004688518d24159606289c74d0c4e123e6436nvd
- git.kernel.org/stable/c/e92f61e0701ea780e57e1be8dbd1fbec5f42c09envd
- git.kernel.org/stable/c/f394d204d64095d72ad9f03ff98f3f3743bf743anvd
- git.kernel.org/stable/c/f4dea9689c5fea3d07170c2cb0703e216f1a0922nvd
News mentions
0No linked articles in our index yet.