We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
Reserved 2025-06-16 | Published 2025-08-11 | Updated 2025-08-11 | Assigner mitregithub.com/libcsp/libcsp/issues/850
github.com/libcsp/libcsp/pull/852
Support options