Out-of-bounds Read Affecting openssl-perl package, versions <1:3.0.7-16.el9_2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-OPENSSLPERL-5738429
- published 26 Jun 2023
- disclosed 21 Jun 2023
Introduced: 21 Jun 2023
CVE-2023-1255 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
openssl-perl
to version 1:3.0.7-16.el9_2 or higher.
This issue was patched in ALSA-2023:3722
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-perl
package and not the openssl-perl
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash.
Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption.
The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service.
If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.
References
- https://errata.almalinux.org/9/ALSA-2023-3722.html
- https://access.redhat.com/security/cve/CVE-2023-1255
- https://access.redhat.com/errata/RHSA-2023:3722
- http://www.openwall.com/lists/oss-security/2023/04/20/13
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a
- https://security.netapp.com/advisory/ntap-20230908-0006/
- https://www.openssl.org/news/secadv/20230419.txt