First published: Wed Mar 15 2023(Updated: )
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.3 | 6.3 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 | |
Linux Kernel | >=4.13<=5.4.240 | |
Linux Kernel | >=5.5<5.10.177 | |
Linux Kernel | >=5.11<5.15.105 | |
Linux Kernel | >=5.16<6.1.20 | |
Linux Kernel | >=6.2<6.2.7 | |
NetApp H300S Firmware | ||
NetApp H410C Firmware | ||
NetApp H410S Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
Debian | =10.0 | |
NetApp Baseboard Management Controller H300S | ||
NetApp Baseboard Management Controller H410C Firmware | ||
NetApp Baseboard Management Controller H410S | ||
NetApp Baseboard Management Controller H500S | ||
NetApp Baseboard Management Controller H700S | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28466 is classified as a high severity vulnerability due to the risk of race conditions that can lead to use-after-free or NULL pointer dereference issues.
To mitigate CVE-2023-28466, upgrade to Linux kernel version 6.3 or higher.
CVE-2023-28466 affects various versions of the Linux kernel up to 6.2.6 and specific versions of IBM Security Verify Governance components.
Yes, Debian Linux versions that are part of the vulnerability scope may be affected by CVE-2023-28466.
CVE-2023-28466 is a race condition vulnerability that occurs in the do_tls_getsockopt function of the Linux kernel.