CVE-2023-28466NULL Pointer Dereference in Kernel

Severity
7.0HIGHNVD
OSV6.5OSV5.5OSV4.7
EPSS
0.0%
top 94.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 16
Latest updateAug 19

Description

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages10 packages

NVDlinux/linux_kernel5.55.10.177+4
Debianlinux/linux_kernel< 5.10.178-1+3
Ubuntulinux/linux_kernel< 5.4.0-156.173+1
debiandebian/linux< linux 6.1.20-1 (bookworm)

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

14
OSV
linux-oem-6.0 vulnerabilities2023-09-19
OSV
linux-azure-fde-5.15 vulnerabilities2023-09-06
OSV
linux-azure-5.4 vulnerabilities2023-09-04
OSV
linux-azure vulnerabilities2023-08-31
OSV
linux-azure, linux-azure-5.15, linux-azure-fde vulnerabilities2023-08-31

📋Vendor Advisories

15
Ubuntu
Linux kernel (OEM) vulnerabilities2023-09-19
Ubuntu
Linux kernel (Azure CVM) vulnerabilities2023-09-06
Ubuntu
Linux kernel (Azure) vulnerabilities2023-09-04
Ubuntu
Linux kernel (Azure) vulnerabilities2023-08-31
Ubuntu
Linux kernel (Azure) vulnerabilities2023-08-31

📄Research Papers

1
arXiv
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects2024-08-19
CVE-2023-28466 — NULL Pointer Dereference in Kernel | cvebase