CVE-2023-53769Cleartext Transmission of Sensitive Info in Linux

Severity
6.0MEDIUM
No vector
EPSS
0.0%
top 94.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: virt/coco/sev-guest: Double-buffer messages The encryption algorithms read and write directly to shared unencrypted memory, which may leak information as well as permit the host to tamper with the message integrity. Instead, copy whole messages in or out as needed before doing any computation on them.

Affected Packages4 packages

Linuxlinux/linux_kernel5.19.06.1.28+2
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linuxd5af44dde5461d125d1602ac913ab5c6bdf09b8b577a64725bfd77645986168e953d405067ee565b+4
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
virt/coco/sev-guest: Double-buffer messages2025-12-08
OSV
CVE-2023-53769: In the Linux kernel, the following vulnerability has been resolved: virt/coco/sev-guest: Double-buffer messages The encryption algorithms read and wri2025-12-08
GHSA
GHSA-3jg5-f6fr-mw89: In the Linux kernel, the following vulnerability has been resolved: virt/coco/sev-guest: Double-buffer messages The encryption algorithms read and w2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: virt/coco/sev-guest: Double-buffer messages2025-12-08
Debian
CVE-2023-53769: linux - In the Linux kernel, the following vulnerability has been resolved: virt/coco/s...2023