In the Linux kernel, the following vulnerability has been resolved:
crypto: s390/aes - Fix buffer overread in CTR mode
When processing the last block, the s390 ctr code will always read
a whole block, even if there isn't a whole block of data left. Fix
this by using the actual length left and copy it into a buffer first
for processing.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2025, 18:46
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285 - Patch | |
| References | () https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79 - Patch | |
| References | () https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b - Patch | |
| References | () https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e - Patch | |
| References | () https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23 - Patch | |
| References | () https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory | |
| CWE | CWE-787 | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
21 Nov 2024, 08:40
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285 - | |
| References | () https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79 - | |
| References | () https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b - | |
| References | () https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e - | |
| References | () https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23 - | |
| References | () https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874 - |
04 Nov 2024, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
17 May 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 14:15
Updated : 2025-12-23 18:46
NVD link : CVE-2023-52669
Mitre link : CVE-2023-52669
CVE.ORG link : CVE-2023-52669
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
