Home

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: Zero padding when dumping algos and encap When copying data to user-space we should ensure that only valid data is copied over. Padding in structures may be filled with random (possibly sensitve) data and should never be given directly to user-space. This patch fixes the copying of xfrm algorithms and the encap template in xfrm_user so that padding is zeroed.

PUBLISHED Reserved 2025-10-07 | Published 2025-10-07 | Updated 2025-10-07 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 0725daaa9a879388ed312110f62dbd5ea2d75f8f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5218af4ad5d8948faac19f71583bcd786c3852df
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1a351e26cc010d6991fbbd5701ac16581372e26f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8222d5910dae08213b6d9d4bc9a7f8502855e624
affected

Default status
affected

5.15.106
unaffected

6.1.23
unaffected

6.2.10
unaffected

6.3
unaffected

References

git.kernel.org/...c/0725daaa9a879388ed312110f62dbd5ea2d75f8f

git.kernel.org/...c/5218af4ad5d8948faac19f71583bcd786c3852df

git.kernel.org/...c/1a351e26cc010d6991fbbd5701ac16581372e26f

git.kernel.org/...c/8222d5910dae08213b6d9d4bc9a7f8502855e624

cve.org (CVE-2023-53684)

nvd.nist.gov (CVE-2023-53684)

Download JSON