Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:4060-1

Опубликовано: 12 окт. 2023
Источник: suse-cvrf

Описание

Security update for rage-encryption

This update for rage-encryption fixes the following issues:

-CVE-2023-42811: chosen ciphertext attack possible against aes-gcm (bsc#1215657)

  • update vendor.tar.zst to contain aes-gcm >= 0.10.3
  • Update to version 0.9.2+0:

    • CI: Ensure apt repository is up-to-date before installing build deps
    • CI: Build Linux releases using ubuntu-20.04 runner
    • CI: Remove most uses of actions-rs actions
  • Update to version 0.9.2+0:

    • Fix changelog bugs and add missing entry
    • Document PINENTRY_PROGRAM environment variable
    • age: Add Decryptor::new_async_buffered
    • age: impl AsyncBufRead for ArmoredReader
    • Pre-initialize vectors when the capacity is known, or use arrays
    • Use PINENTRY_PROGRAM as environment variable for pinentry
    • Document why impl AsyncWrite for StreamWriter doesn't loop indefinitely
    • cargo update
    • cargo vet prune
    • Migrate to cargo-vet 0.7
    • build(deps): bump svenstaro/upload-release-action from 2.5.0 to 2.6.1
    • Correct spelling in documentation
    • build(deps): bump codecov/codecov-action from 3.1.1 to 3.1.4
    • StreamWriter AsyncWrite: fix usage with futures::io::copy()
    • rage: Use Decryptor::new_buffered
    • age: Add Decryptor::new_buffered
    • age: impl BufRead for ArmoredReader
    • Update Homebrew formula to v0.9.1
    • feat/pinentry: Use env var to define pinentry binary
  • Update to version 0.9.1+0:

    • ssh: Fix parsing of OpenSSH private key format
    • ssh: Support aes256-gcm@openssh.com ciphers for encrypted keys
    • ssh: Add aes256-gcm@openssh.com cipher to test cases
    • ssh: Extract common key material derivation logic for encrypted keys
    • ssh: Use associated constants for key and IV sizes
    • ssh: Add test cases for encrypted keys
  • Add shell completions for fish and zsh.

Список пакетов

SUSE Linux Enterprise Module for Basesystem 15 SP5
rage-encryption-0.9.2+0-150500.3.3.1
rage-encryption-bash-completion-0.9.2+0-150500.3.3.1
openSUSE Leap 15.5
rage-encryption-0.9.2+0-150500.3.3.1
rage-encryption-bash-completion-0.9.2+0-150500.3.3.1

Описание

aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0 and prior to version 0.10.3, in the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext) is exposed even if tag verification fails. If a program using the `aes-gcm` crate's `decrypt_in_place*` APIs accesses the buffer after decryption failure, it will contain a decryption of an unauthenticated input. Depending on the specific nature of the program this may enable Chosen Ciphertext Attacks (CCAs) which can cause a catastrophic breakage of the cipher including full plaintext recovery. Version 0.10.3 contains a fix for this issue.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP5:rage-encryption-0.9.2+0-150500.3.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP5:rage-encryption-bash-completion-0.9.2+0-150500.3.3.1
openSUSE Leap 15.5:rage-encryption-0.9.2+0-150500.3.3.1
openSUSE Leap 15.5:rage-encryption-bash-completion-0.9.2+0-150500.3.3.1

Ссылки