Severity
5.5MEDIUMNVD
GHSA9.8
EPSS
0.2%
top 60.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 26
Latest updateMay 24

Description

A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Debianlinux/linux_kernel< 4.19.20-1+3
CVEListV5linux/linux_kernelAll kernel versions before 5.0
NVDopensuse/leap15.1

Also affects: Enterprise Linux 7.0

Patches

🔴Vulnerability Details

4
GHSA
GHSA-ccvh-qcqm-vp82: A buffer over-read flaw was found in RH kernel versions before 52022-05-24
GHSA
Remote code execution in mongo-express2021-04-13
CVEList
CVE-2020-10769: A buffer over-read flaw was found in RH kernel versions before 52020-06-26
OSV
CVE-2020-10769: A buffer over-read flaw was found in RH kernel versions before 52020-06-26

📋Vendor Advisories

2
Debian
CVE-2020-10769: linux - A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_aut...2020
Red Hat
kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned.2019-11-05

💬Community

1
Bugzilla
CVE-2020-10769 kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned.2019-05-10
CVE-2020-10769 — Out-of-bounds Read in Linux Kernel | cvebase