{"id":"CVE-2023-28772","details":"An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.","modified":"2026-03-14T12:04:48.382042Z","published":"2023-03-23T15:15:12.177Z","related":["ALSA-2023:7077","SUSE-SU-2023:1800-1","SUSE-SU-2023:1801-1","SUSE-SU-2023:1803-1","SUSE-SU-2023:1811-1","SUSE-SU-2023:1848-1","SUSE-SU-2023:1892-1","SUSE-SU-2023:1894-1","SUSE-SU-2023:2232-1","SUSE-SU-2023:2805-1"],"references":[{"type":"WEB","url":"https://lkml.kernel.org/r/20210626032156.47889-1-yun.zhou%40windriver.com"},{"type":"WEB","url":"https://lore.kernel.org/lkml/20210625122453.5e2fe304%40oasis.local.home/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230427-0005/"},{"type":"ADVISORY","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28772.json","unresolved_ranges":[{"events":[{"introduced":"2.6.27"},{"fixed":"4.4.276"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.276"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.240"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.198"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.133"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.51"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.12.18"}]},{"events":[{"introduced":"5.13"},{"fixed":"5.13.3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}