CVE-2023-52669
📋 TL;DR
This CVE describes a buffer overread vulnerability in the Linux kernel's s390 AES CTR mode implementation. When processing the final block of data, the code reads a full block regardless of remaining data length, potentially exposing sensitive information. This affects Linux systems using s390 architecture with AES-CTR encryption.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Information disclosure of kernel memory contents, potentially exposing encryption keys, passwords, or other sensitive data from adjacent memory regions.
Likely Case
Limited information leak of kernel memory, potentially exposing some system information but not full control.
If Mitigated
No impact if systems are patched or don't use affected s390 AES-CTR implementation.
🎯 Exploit Status
Requires local access and ability to trigger AES-CTR operations on s390 systems. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: a7f580cdb42ec3d53bbb7c4e4335a98423703285, cd51e26a3b89706beec64f2d8296cfb1c34e0c79, d07f951903fa9922c375b8ab1ce81b18a0034e3b, d68ac38895e84446848b7647ab9458d54cacba3e, dbc9a791a70ea47be9f2acf251700fe254a2ab23
Vendor Advisory: https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable s390 AES-CTR module
linuxPrevent loading of vulnerable cryptographic module
echo 'blacklist aes_s390' >> /etc/modprobe.d/blacklist.conf
rmmod aes_s390
🧯 If You Can't Patch
- Restrict local user access to s390 systems
- Monitor for unusual cryptographic operations or memory access patterns
🔍 How to Verify
Check if Vulnerable:
Check if running on s390 architecture and using AES-CTR: 'uname -m' and check kernel version against patched commits
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits: 'uname -r' and check with distribution vendor
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages related to crypto operations
- Unexpected memory access patterns in kernel logs
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
source="kernel" AND ("crypto" OR "aes" OR "s390") AND ("panic" OR "oops" OR "BUG")
🔗 References
- https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285
- https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79
- https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b
- https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e
- https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23
- https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874
- https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285
- https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79
- https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b
- https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e
- https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23
- https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html