CVE-2023-52669

In the Linux kernel, the following vulnerability has been resolved: crypto: s390/aes - Fix buffer overread in CTR mode When processing the last block, the s390 ctr code will always read a whole block, even if there isn't a whole block of data left. Fix this by using the actual length left and copy it into a buffer first for processing.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2025, 18:46

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285 - () https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285 - Patch
References () https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79 - () https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79 - Patch
References () https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b - () https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b - Patch
References () https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e - () https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e - Patch
References () https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23 - () https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23 - Patch
References () https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874 - () https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory
CWE CWE-787
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285 - () https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285 -
References () https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79 - () https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79 -
References () https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b - () https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b -
References () https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e - () https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e -
References () https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23 - () https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23 -
References () https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874 - () https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874 -

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: s390/aes - Corrige la sobrelectura del buffer en modo CTR Al procesar el último bloque, el código ctr s390 siempre leerá un bloque completo, incluso si no hay un bloque completo de datos restantes. Solucione este problema utilizando la longitud real restante y cópielo primero en un búfer para procesarlo.

17 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 14:15

Updated : 2025-12-23 18:46


NVD link : CVE-2023-52669

Mitre link : CVE-2023-52669

CVE.ORG link : CVE-2023-52669


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write