Eneas U de Queiroz 1c5cafa3eb openssl: fix low-severity CVE-2023-1255
This applies commit 02ac9c94 to fix this OpenSSL Security Advisory
issued on 20th April 2023[1]:

Input buffer over-read in AES-XTS implementation on 64 bit ARM
(CVE-2023-1255)
==============================================================

Severity: Low

Issue summary: The AES-XTS cipher decryption implementation for 64 bit
ARM platform contains a bug that could cause it to read past the input
buffer, leading to a crash.

Impact summary: Applications that use the AES-XTS algorithm on the 64
bit ARM platform can crash in rare circumstances. The AES-XTS algorithm
is usually used for disk encryption.

The AES-XTS cipher decryption implementation for 64 bit ARM platform
will read past the end of the ciphertext buffer if the ciphertext size
is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the
memory after the ciphertext buffer is unmapped, this will trigger a
crash which results in a denial of service.

If an attacker can control the size and location of the ciphertext
buffer being decrypted by an application using AES-XTS on 64 bit ARM,
the application is affected. This is fairly unlikely making this issue a
Low severity one.

1. https://www.openssl.org/news/secadv/20230420.txt

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2023-04-29 12:33:44 +02:00
..
2023-04-08 15:52:56 +02:00
2022-07-04 20:37:41 +02:00
2022-09-06 16:36:44 +01:00
2022-09-06 16:36:45 +01:00
2023-04-22 02:35:19 +02:00
2022-09-06 16:36:48 +01:00
2022-09-06 16:36:48 +01:00
2022-07-10 19:07:47 +02:00
2023-01-13 22:02:20 +01:00
2022-09-07 04:22:40 +01:00
2023-04-10 13:36:26 +02:00
2023-02-26 01:12:02 +01:00
2022-04-16 14:02:11 +02:00
2022-10-02 20:22:54 +02:00
2022-10-23 18:16:22 +02:00
2022-11-13 20:47:57 +01:00