CVE-2023-54312

Source
https://cve.org/CVERecord?id=CVE-2023-54312
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54312.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54312
Downstream
Related
Published
2025-12-30T12:23:43.828Z
Modified
2026-03-31T17:29:32.605723125Z
Summary
samples/bpf: Fix buffer overflow in tcp_basertt
Details

In the Linux kernel, the following vulnerability has been resolved:

samples/bpf: Fix buffer overflow in tcp_basertt

Using sizeof(nv) or strlen(nv)+1 is correct.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54312.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c890063e440456e75c2e70f6bcec3797f1771eb6
Fixed
cf7514fedc25675e68b74941df28a883951e70fd
Fixed
f394d204d64095d72ad9f03ff98f3f3743bf743a
Fixed
bd3e880dce27d225598730d2bbb3dc05b443af22
Fixed
e92f61e0701ea780e57e1be8dbd1fbec5f42c09e
Fixed
56c25f2763a16db4fa1b486e6a21dc246cd992bd
Fixed
dfc004688518d24159606289c74d0c4e123e6436
Fixed
7c08d1b0d1f75117cf82aeaef49ba9f861b3fb59
Fixed
f4dea9689c5fea3d07170c2cb0703e216f1a0922

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54312.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.291
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.251
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.188
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.121
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.39
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.3.13
Type
ECOSYSTEM
Events
Introduced
6.4.0
Fixed
6.4.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54312.json"