libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
References
| Link | Resource |
|---|---|
| https://github.com/libcsp/libcsp/issues/850 | Third Party Advisory |
| https://github.com/libcsp/libcsp/pull/852 | Patch |
Configurations
History
No history.
Information
Published : 2025-08-11 19:15
Updated : 2025-08-14 16:24
NVD link : CVE-2025-51823
Mitre link : CVE-2025-51823
CVE.ORG link : CVE-2025-51823
JSON object : View
Products Affected
libcsp
- libcsp
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
