CVE-2023-52669

Updated: 2025-12-28 03:42:29.858838

Description:

In the Linux kernel, the following vulnerability has been resolved: crypto: s390/aes - Fix buffer overread in CTR mode When processing the last block, the s390 ctr code will always read a whole block, even if there isn't a whole block of data left. Fix this by using the actual length left and copy it into a buffer first for processing.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Ignored 2024-07-02 14:25:25 This flaw is confined to the IBM Z/s390 AES-CTR kernel crypto implementation, so systems running x86...
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Ignored 2024-07-02 14:25:25 Ignored due to low severity
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Ignored 2024-07-02 14:25:24 Ignored due to low severity
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Ignored 2024-07-03 10:07:30 Ignored due to low severity
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Ignored 2024-07-03 10:07:30 Ignored due to low severity
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Ignored 2024-07-03 10:07:30 Ignored due to low severity
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Ignored 2024-07-02 14:25:25 Ignored due to low severity
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2026-02-14 21:38:55
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Not Vulnerable 2026-02-14 20:51:59
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Not Vulnerable 2026-02-14 20:51:50
Total: 11