First published: Fri Nov 18 2022(Updated: )
A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.2 | 6.2 |
Linux kernel | <6.2 | |
Red Hat Enterprise Linux | =8.0 | |
Linux Kernel | <6.2 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28328 has a high severity rating due to its potential to cause system crashes and denial of service.
CVE-2023-28328 can lead to local users crashing the system, resulting in a denial of service.
To mitigate CVE-2023-28328, users should upgrade to kernel versions 6.2 or apply the recommended patches.
CVE-2023-28328 affects systems running vulnerable versions of the Linux Kernel and certain IBM Security Verify Governance components.
You can check your system's kernel version and compare it to the vulnerable versions noted in the CVE-2023-28328 documentation.