Bugzilla – Bug 1215657
VUL-0: CVE-2023-42811: rage-encryption: aes-gcm: chosen ciphertext attack via `decrypt_in_place*` APIs
Last modified: 2023-10-12 12:46:20 UTC
+++ This bug was initially created as a clone of Bug #1215654 +++ CVE-2023-42811 aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0 and prior to version 0.10.3, in the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext) is exposed even if tag verification fails. If a program using the `aes-gcm` crate's `decrypt_in_place*` APIs accesses the buffer after decryption failure, it will contain a decryption of an unauthenticated input. Depending on the specific nature of the program this may enable Chosen Ciphertext Attacks (CCAs) which can cause a catastrophic breakage of the cipher including full plaintext recovery. Version 0.10.3 contains a fix for this issue. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42811 https://www.cve.org/CVERecord?id=CVE-2023-42811 https://docs.rs/aes-gcm/latest/src/aes_gcm/lib.rs.html#309 https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq
This is an autogenerated message for OBS integration: This bug (1215657) was mentioned in https://build.opensuse.org/request/show/1113697 Factory / rage-encryption
SUSE-SU-2023:4060-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1215657 CVE References: CVE-2023-42811 Sources used: openSUSE Leap 15.5 (src): rage-encryption-0.9.2+0-150500.3.3.1 Basesystem Module 15-SP5 (src): rage-encryption-0.9.2+0-150500.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.