Bug 1210714 (CVE-2023-1255) - VUL-0: CVE-2023-1255: openssl-3: Input buffer over-read in AES-XTS implementation on 64 bit ARM
Summary: VUL-0: CVE-2023-1255: openssl-3: Input buffer over-read in AES-XTS implementa...
Status: RESOLVED FIXED
Alias: CVE-2023-1255
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/364125/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-1255:5.5:(AV:L...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-04-21 06:57 UTC by Robert Frohl
Modified: 2024-05-06 12:45 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2023-04-21 06:57:58 UTC
CVE-2023-1255

Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM
platform contains a bug that could cause it to read past the input buffer,
leading to a crash.

Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM
platform can crash in rare circumstances. The AES-XTS algorithm is usually
used for disk encryption.

The AES-XTS cipher decryption implementation for 64 bit ARM platform will read
past the end of the ciphertext buffer if the ciphertext size is 4 mod 5, e.g.
144 bytes or 1024 bytes. If the memory after the ciphertext buffer is
unmapped, this will trigger a crash which results in a denial of service.

If an attacker can control the size and location of the ciphertext buffer
being decrypted by an application using AES-XTS on 64 bit ARM, the
application is affected. This is fairly unlikely making this issue
a Low severity one.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1255
https://bugzilla.redhat.com/show_bug.cgi?id=2188461
https://www.cve.org/CVERecord?id=CVE-2023-1255
http://www.openwall.com/lists/oss-security/2023/04/20/13
https://seclists.org/oss-sec/2023/q2/86
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a
https://www.openssl.org/news/secadv/20230419.txt
Comment 4 OBSbugzilla Bot 2023-05-31 08:35:08 UTC
This is an autogenerated message for OBS integration:
This bug (1210714) was mentioned in
https://build.opensuse.org/request/show/1089933 Factory / openssl-3
Comment 6 Otto Hollmann 2023-05-31 14:15:03 UTC
Only OpenSSL 3.x.x was affected, here is list of all submissions:
> Codestream              Package            Request
> ------------------------------------------------------------------------------------
> SUSE:SLE-15-SP5:Update  openssl-3          https://build.suse.de/request/show/300180
> SUSE:SLE-15-SP4:Update  openssl-3          https://build.suse.de/request/show/300182
> openSUSE:Factory        openssl-3          https://build.opensuse.org/request/show/1089933
> openSUSE:Factory        openssl            https://build.opensuse.org/request/show/1089934
Comment 8 Maintenance Automation 2023-06-08 08:30:08 UTC
SUSE-SU-2023:2470-1: An update that solves three vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1205476, 1210714, 1211430
CVE References: CVE-2022-40735, CVE-2023-1255, CVE-2023-2650
Sources used:
Basesystem Module 15-SP4 (src): openssl-3-3.0.8-150400.4.26.1
openSUSE Leap 15.4 (src): openssl-3-3.0.8-150400.4.26.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Otto Hollmann 2023-06-20 09:06:16 UTC
ALP synced with Factory:
openssl-3      https://build.suse.de/request/show/301665
openssl (meta) https://build.suse.de/request/show/301667
Comment 11 Maintenance Automation 2023-06-23 12:30:16 UTC
SUSE-SU-2023:2620-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1210714, 1211430
CVE References: CVE-2023-1255, CVE-2023-2650
Sources used:
openSUSE Leap 15.5 (src): openssl-3-3.0.8-150500.5.3.1
Basesystem Module 15-SP5 (src): openssl-3-3.0.8-150500.5.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Otto Hollmann 2023-06-28 15:44:40 UTC
Assigning back to security team.
Comment 20 Robert Frohl 2024-05-06 12:45:31 UTC
done, closing