CVE-2023-1255
ADVISORY - nistSummary
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash.
Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption.
The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service.
If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.
Common Weakness Enumeration (CWE)
Out-of-bounds Read
Improper Restriction of Operations within the Bounds of a Memory Buffer
NIST
2.2
CVSS SCORE
5.9mediumAlpine
-
Debian
-
CVSS SCORE
N/AlowUbuntu
2.2
CVSS SCORE
5.9lowAlma
-
CVSS SCORE
N/AmediumAmazon
-
CVSS SCORE
N/AmediumRed Hat
1.4
CVSS SCORE
5.1lowOracle
-
CVSS SCORE
N/AhighOracle
-
CVSS SCORE
N/AmediumChainguard
CGA-5fgr-29pq-jqpq
-
Chainguard
CGA-68pr-6w9c-9hgg
-
Chainguard
CGA-6963-c2xq-q3hq
-
Chainguard
CGA-82qx-j63j-44f9
-
Chainguard
CGA-jf7q-38x8-hqr3
-
Chainguard
CGA-xvpw-28qh-h7jh
-
Photon
CVE-2023-1255
-