do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3404-1 | linux-5.10 security update |
![]() |
EUVD-2023-32143 | do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). |
![]() |
USN-6033-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6175-1 | Linux kernel vulnerabilities |
![]() |
USN-6186-1 | Linux kernel vulnerabilities |
![]() |
USN-6284-1 | Linux kernel vulnerabilities |
![]() |
USN-6300-1 | Linux kernel vulnerabilities |
![]() |
USN-6301-1 | Linux kernel vulnerabilities |
![]() |
USN-6311-1 | Linux kernel vulnerabilities |
![]() |
USN-6312-1 | Linux kernel vulnerabilities |
![]() |
USN-6314-1 | Linux kernel vulnerabilities |
![]() |
USN-6331-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6332-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6337-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6347-1 | Linux kernel (Azure CVM) vulnerabilities |
![]() |
USN-6385-1 | Linux kernel (OEM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 05 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-05T16:02:32.757Z
Reserved: 2023-03-15T00:00:00.000Z
Link: CVE-2023-28466

Updated: 2024-08-02T12:38:25.383Z

Status : Modified
Published: 2023-03-16T00:15:11.563
Modified: 2025-05-05T16:15:34.003
Link: CVE-2023-28466


No data.