{"id":"CVE-2020-10769","details":"A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.","modified":"2026-03-12T23:39:05.175886Z","published":"2020-06-26T16:15:12.140Z","related":["SUSE-SU-2020:14442-1","SUSE-SU-2020:2103-1","SUSE-SU-2020:2106-1","SUSE-SU-2020:2107-1","SUSE-SU-2020:2119-1","SUSE-SU-2020:2121-1","SUSE-SU-2020:2122-1","SUSE-SU-2020:2156-1","SUSE-SU-2020:2478-1","SUSE-SU-2020:2487-1","SUSE-SU-2022:2077-1","SUSE-SU-2022:2082-1","openSUSE-SU-2020:1153-1"],"references":[{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1708775%3B"},{"type":"FIX","url":"https://lkml.org/lkml/2019/1/21/675"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10769.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}