Bug 1213385 (CVE-2023-37464)

Summary: VUL-0: CVE-2023-37464: cjose: OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the J
Product: [Novell Products] SUSE Security Incidents Reporter: Stoyan Manolov <stoyan.manolov>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/372586/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-37464:8.6:(AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Stoyan Manolov 2023-07-17 08:51:03 UTC
CVE-2023-37464

OpenIDC/cjose is a C library implementing the Javascript Object Signing and
Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag
length from the actual Authentication Tag provided in the JWE. The spec  says
that a fixed length of 16 octets must be applied. Therefore this bug allows an
attacker to provide a truncated Authentication Tag and to modify the JWE
accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to
upgrade should avoid using AES GCM encryption and replace it with another
encryption algorithm (e.g. AES CBC).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37464
https://www.cve.org/CVERecord?id=CVE-2023-37464
https://datatracker.ietf.org/doc/html/rfc7518#section-4.7
https://github.com/OpenIDC/cjose/commit/7325e9a5e71e2fc0e350487ecac7d84acdf0ed5e
https://github.com/OpenIDC/cjose/releases/tag/v0.6.2.2
https://github.com/OpenIDC/cjose/security/advisories/GHSA-3rhg-3gf2-6xgj
Comment 3 Maintenance Automation 2023-07-31 12:30:35 UTC
SUSE-SU-2023:3030-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1213385
CVE References: CVE-2023-37464
Sources used:
SUSE OpenStack Cloud 9 (src): cjose-0.6.1-7.5.1
SUSE OpenStack Cloud Crowbar 9 (src): cjose-0.6.1-7.5.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): cjose-0.6.1-7.5.1
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): cjose-0.6.1-7.5.1
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): cjose-0.6.1-7.5.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): cjose-0.6.1-7.5.1
SUSE Linux Enterprise Server 12 SP5 (src): cjose-0.6.1-7.5.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): cjose-0.6.1-7.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 4 Maintenance Automation 2023-08-08 16:30:12 UTC
SUSE-SU-2023:3230-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1213385
CVE References: CVE-2023-37464
Sources used:
openSUSE Leap 15.4 (src): cjose-0.6.1-150100.4.6.1
openSUSE Leap 15.5 (src): cjose-0.6.1-150100.4.6.1
Server Applications Module 15-SP4 (src): cjose-0.6.1-150100.4.6.1
Server Applications Module 15-SP5 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise Real Time 15 SP3 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): cjose-0.6.1-150100.4.6.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): cjose-0.6.1-150100.4.6.1
SUSE Manager Proxy 4.2 (src): cjose-0.6.1-150100.4.6.1
SUSE Manager Retail Branch Server 4.2 (src): cjose-0.6.1-150100.4.6.1
SUSE Manager Server 4.2 (src): cjose-0.6.1-150100.4.6.1
SUSE Enterprise Storage 7.1 (src): cjose-0.6.1-150100.4.6.1
SUSE Enterprise Storage 7 (src): cjose-0.6.1-150100.4.6.1
SUSE CaaS Platform 4.0 (src): cjose-0.6.1-150100.4.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.