In the Linux kernel, the following vulnerability has been resolved: samples/bpf: syscall_tp_user: Fix array out-of-bound access The Linux kernel CVE team has assigned CVE-2023-52793 to this issue. Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024052157-CVE-2023-52793-18ab@gregkh/T
The result of automatic check (that is developed by Alexander Larkin) for this CVE-2023-52793 is: SKIP No affected files built, so skip this CVE NO - - unknown (where first YES/NO value means if related sources built).
This CVE has been rejected upstream: https://lore.kernel.org/linux-cve-announce/2024052439-REJECTED-054c@gregkh/