CVE-2023-28772
Published: October 18, 2023Last modified: October 18, 2023
Description
An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.7 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | HIGH |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | Stream | linux-lts | Not affected (6.1.50-r0) |
References
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
- https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7
- https://lkml.kernel.org/r/20210626032156.47889-1-yun.zhou%40windriver.com
- https://lkml.kernel.org/r/[email protected]
- https://lore.kernel.org/lkml/20210625122453.5e2fe304%40oasis.local.home/
- https://lore.kernel.org/lkml/[email protected]/
- https://security.netapp.com/advisory/ntap-20230427-0005/