{"id":"CVE-2023-54145","summary":"bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log\n\nIt's trivial for user to trigger \"verifier log line truncated\" warning,\nas verifier has a fixed-sized buffer of 1024 bytes (as of now), and there are at\nleast two pieces of user-provided information that can be output through\nthis buffer, and both can be arbitrarily sized by user:\n  - BTF names;\n  - BTF.ext source code lines strings.\n\nVerifier log buffer should be properly sized for typical verifier state\noutput. But it's sort-of expected that this buffer won't be long enough\nin some circumstances. So let's drop the check. In any case code will\nwork correctly, at worst truncating a part of a single line output.","modified":"2026-04-02T09:45:37.931859Z","published":"2025-12-24T13:06:58.227Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54145.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/40c88c429a598006f91ad7a2b89856cd50b3a008"},{"type":"WEB","url":"https://git.kernel.org/stable/c/926a175026fed5d534f587ea4ec3ec49265cd3c5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cff36398bd4c7d322d424433db437f3c3391c491"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54145.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54145"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a2a7d5701052542cd2260e7659b12443e0a74733"},{"fixed":"40c88c429a598006f91ad7a2b89856cd50b3a008"},{"fixed":"926a175026fed5d534f587ea4ec3ec49265cd3c5"},{"fixed":"cff36398bd4c7d322d424433db437f3c3391c491"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54145.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"6.1.107"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.7"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54145.json"}}],"schema_version":"1.7.5"}