CVE-2023-52669

Source
https://cve.org/CVERecord?id=CVE-2023-52669
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52669.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52669
Downstream
Related
Published
2024-05-17T14:01:57.025Z
Modified
2026-03-23T05:06:17.016144772Z
Summary
crypto: s390/aes - Fix buffer overread in CTR mode
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: s390/aes - Fix buffer overread in CTR mode

When processing the last block, the s390 ctr code will always read a whole block, even if there isn't a whole block of data left. Fix this by using the actual length left and copy it into a buffer first for processing.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52669.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0200f3ecc19660bebeabbcbaf212957fcf1dbf8f
Fixed
cd51e26a3b89706beec64f2d8296cfb1c34e0c79
Fixed
a7f580cdb42ec3d53bbb7c4e4335a98423703285
Fixed
dbc9a791a70ea47be9f2acf251700fe254a2ab23
Fixed
d68ac38895e84446848b7647ab9458d54cacba3e
Fixed
e78f1a43e72daf77705ad5b9946de66fc708b874
Fixed
d07f951903fa9922c375b8ab1ce81b18a0034e3b

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52669.json"