Bugzilla – Bug 1210714
VUL-0: CVE-2023-1255: openssl-3: Input buffer over-read in AES-XTS implementation on 64 bit ARM
Last modified: 2024-05-06 12:45:31 UTC
CVE-2023-1255 Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service. If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1255 https://bugzilla.redhat.com/show_bug.cgi?id=2188461 https://www.cve.org/CVERecord?id=CVE-2023-1255 http://www.openwall.com/lists/oss-security/2023/04/20/13 https://seclists.org/oss-sec/2023/q2/86 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a https://www.openssl.org/news/secadv/20230419.txt
This is an autogenerated message for OBS integration: This bug (1210714) was mentioned in https://build.opensuse.org/request/show/1089933 Factory / openssl-3
Only OpenSSL 3.x.x was affected, here is list of all submissions: > Codestream Package Request > ------------------------------------------------------------------------------------ > SUSE:SLE-15-SP5:Update openssl-3 https://build.suse.de/request/show/300180 > SUSE:SLE-15-SP4:Update openssl-3 https://build.suse.de/request/show/300182 > openSUSE:Factory openssl-3 https://build.opensuse.org/request/show/1089933 > openSUSE:Factory openssl https://build.opensuse.org/request/show/1089934
SUSE-SU-2023:2470-1: An update that solves three vulnerabilities can now be installed. Category: security (moderate) Bug References: 1205476, 1210714, 1211430 CVE References: CVE-2022-40735, CVE-2023-1255, CVE-2023-2650 Sources used: Basesystem Module 15-SP4 (src): openssl-3-3.0.8-150400.4.26.1 openSUSE Leap 15.4 (src): openssl-3-3.0.8-150400.4.26.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
ALP synced with Factory: openssl-3 https://build.suse.de/request/show/301665 openssl (meta) https://build.suse.de/request/show/301667
SUSE-SU-2023:2620-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1210714, 1211430 CVE References: CVE-2023-1255, CVE-2023-2650 Sources used: openSUSE Leap 15.5 (src): openssl-3-3.0.8-150500.5.3.1 Basesystem Module 15-SP5 (src): openssl-3-3.0.8-150500.5.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Assigning back to security team.
done, closing