CVE-2023-52669

medium

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: s390/aes - Fix buffer overread in CTR mode When processing the last block, the s390 ctr code will always read a whole block, even if there isn't a whole block of data left. Fix this by using the actual length left and copy it into a buffer first for processing.

References

https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874

https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23

https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e

https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b

https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79

https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285

Details

Source: Mitre, NVD

Published: 2024-05-17

Updated: 2024-06-25

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium