An issue was discovered in the Linux kernel before 5.13.3. lib/seqbuf.c has a seqbufputmemhex buffer overflow.
[
{
"deprecated": false,
"id": "CVE-2023-28772-08360a33",
"digest": {
"line_hashes": [
"204677702151873588304548576598968552066",
"206765293416252555223592269905135985865",
"10764202503415909227966857509556521011",
"111356567867610685726214219327775358912",
"243894625604268361112115885359101344830"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "lib/seq_buf.c"
},
"source": "https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7",
"signature_type": "Line"
},
{
"deprecated": false,
"id": "CVE-2023-28772-542de7b4",
"digest": {
"function_hash": "110787319765045387143425896334017384351",
"length": 699.0
},
"signature_version": "v1",
"target": {
"function": "seq_buf_putmem_hex",
"file": "lib/seq_buf.c"
},
"source": "https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7",
"signature_type": "Function"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28772.json"