CVE-2020-10769
Summary
| CVE | CVE-2020-10769 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-06-26 16:15:00 UTC |
| Updated | 2023-02-12 23:39:00 UTC |
| Description | A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| LKML: Greg Kroah-Hartman: [PATCH 4.14 21/59] crypto: authenc - fix parsing key with misaligned rta_len |
MISC |
lkml.org |
Exploit, Mailing List, Patch, Third Party Advisory |
| Red Hat Customer Portal |
MISC |
access.redhat.com |
|
| 1708775 – (CVE-2020-10769) CVE-2020-10769 kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. |
MISC |
bugzilla.redhat.com |
Issue Tracking, Vendor Advisory |
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| 1708775 – (CVE-2020-10769) CVE-2020-10769 kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. |
MISC |
bugzilla.redhat.com |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| [security-announce] openSUSE-SU-2020:1153-1: important: Security update |
SUSE |
lists.opensuse.org |
Mailing List, Third Party Advisory |
| 1708775 – (CVE-2020-10769) CVE-2020-10769 kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. |
MISC |
bugzilla.redhat.com |
|
| Oracle Critical Patch Update Advisory - April 2021 |
MISC |
www.oracle.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 174728 SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2020:2122-1)
- 174729 SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2020:2106-1)
- 752231 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:2082-1)