Bug 1215654 (CVE-2023-42811) - VUL-0: CVE-2023-42811: TRACKERBUG: aes-gcm: chosen ciphertext attack via `decrypt_in_place*` APIs
Summary: VUL-0: CVE-2023-42811: TRACKERBUG: aes-gcm: chosen ciphertext attack via `dec...
Status: NEW
Alias: CVE-2023-42811
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/379692/
Whiteboard:
Keywords:
Depends on:
Blocks: 1215655 1215656 1215657 1215658 1215659 1215660
  Show dependency treegraph
 
Reported: 2023-09-25 07:35 UTC by Carlos López
Modified: 2023-09-25 08:15 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2023-09-25 07:35:08 UTC
CVE-2023-42811

aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0
and prior to version 0.10.3, in the AES GCM implementation of
decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext)
is exposed even if tag verification fails. If a program using the `aes-gcm`
crate's `decrypt_in_place*` APIs accesses the buffer after decryption failure,
it will contain a decryption of an unauthenticated input. Depending on the
specific nature of the program this may enable Chosen Ciphertext Attacks (CCAs)
which can cause a catastrophic breakage of the cipher including full plaintext
recovery. Version 0.10.3 contains a fix for this issue.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42811
https://www.cve.org/CVERecord?id=CVE-2023-42811
https://docs.rs/aes-gcm/latest/src/aes_gcm/lib.rs.html#309
https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq