First published: Thu Mar 23 2023(Updated: )
An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <5.14 | 5.14 |
Linux Kernel | >=2.6.27<4.4.276 | |
Linux Kernel | >=4.5<4.9.276 | |
Linux Kernel | >=4.10<4.14.240 | |
Linux Kernel | >=4.15<4.19.198 | |
Linux Kernel | >=4.20<5.4.133 | |
Linux Kernel | >=5.5<5.10.51 | |
Linux Kernel | >=5.11<5.12.18 | |
Linux Kernel | >=5.13<5.13.3 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28772 is categorized with a severity that could lead to a buffer overflow vulnerability in the Linux kernel.
To mitigate CVE-2023-28772, upgrade to the Linux kernel version 5.14 or higher.
CVE-2023-28772 affects Linux kernel versions prior to 5.13.3.
CVE-2023-28772 is a buffer overflow vulnerability found in the seq_buf_putmem_hex function.
The vulnerability CVE-2023-28772 is specifically associated with the lib/seq_buf.c library in the Linux kernel.