CVE-2023-52669

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52669
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52669.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52669
Downstream
Related
Published
2024-05-17T14:01:57.025Z
Modified
2025-11-28T02:35:35.275208Z
Summary
crypto: s390/aes - Fix buffer overread in CTR mode
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: s390/aes - Fix buffer overread in CTR mode

When processing the last block, the s390 ctr code will always read a whole block, even if there isn't a whole block of data left. Fix this by using the actual length left and copy it into a buffer first for processing.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52669.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0200f3ecc19660bebeabbcbaf212957fcf1dbf8f
Fixed
cd51e26a3b89706beec64f2d8296cfb1c34e0c79
Fixed
a7f580cdb42ec3d53bbb7c4e4335a98423703285
Fixed
dbc9a791a70ea47be9f2acf251700fe254a2ab23
Fixed
d68ac38895e84446848b7647ab9458d54cacba3e
Fixed
e78f1a43e72daf77705ad5b9946de66fc708b874
Fixed
d07f951903fa9922c375b8ab1ce81b18a0034e3b

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.0.0
Fixed
5.10.210
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.149
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.76
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.15
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.3