CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
19.1%
An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c
has a seq_buf_putmem_hex buffer overflow.
Author | Note |
---|---|
cascardo | there is no current seq_buf_putmem_hex user with exploitable input |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-156.163 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-84.94 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1111.118 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1056.59 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1056.59~18.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < 4.15.0-1111.118~16.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1058.60 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < 4.15.0-1123.136~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < 4.15.0-1123.136~16.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-4.15 | < 4.15.0-1123.136 | UNKNOWN |
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
git.kernel.org/linus/d3b16034a24a112bb83aeb669ac5b9b01f744bb7 (5.14-rc1)
github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7
launchpad.net/bugs/cve/CVE-2023-28772
lkml.kernel.org/r/[email protected]
lore.kernel.org/lkml/[email protected]/
nvd.nist.gov/vuln/detail/CVE-2023-28772
security-tracker.debian.org/tracker/CVE-2023-28772
www.cve.org/CVERecord?id=CVE-2023-28772