Bug 2257571 (CVE-2023-6129)

Summary: CVE-2023-6129 mysql: openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: adudiak, bdettelb, caswilli, csutherl, dfreiber, dhalasz, dkuc, drow, fjansen, hhorak, hkataria, jburrell, jclere, jmitchel, jorton, jsamir, jsherril, jtanner, kaycoth, kshier, ljavorsk, luizcosta, mmadzin, mschorm, mturk, nweather, orabin, pjindal, plodge, psegedy, stcannon, sthirugn, szappis, tsasak, vkrizan, vkumar, vmugicag, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: OpenSSL 3.0, OpenSSL 3.1, OpenSSL 3.2 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in in the POLY1305 MAC (message authentication code) implementation in OpenSSL, affecting applications running on PowerPC CPU-based platforms that utilize vector instructions, and has the potential to corrupt the internal state of these applications. If an attacker can manipulate the utilization of the POLY1305 MAC algorithm, it may lead to the corruption of the application state, resulting in various application-dependent consequences, often resulting in a crash and leading to a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2257574, 2257575, 2257576, 2275460, 2275461, 2257573    
Bug Blocks: 2257577, 2275454    

Description TEJ RATHI 2024-01-10 05:01:06 UTC
The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions.

OpenSSL versions 3.0.0 to 3.0.12, 3.1.0 to 3.1.4 and 3.2.0 are vulnerable to this issue. 
The FIPS provider is not affected because the POLY1305 MAC algorithm is not FIPS approved and the FIPS provider does not implement it.

OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.

http://www.openwall.com/lists/oss-security/2024/01/09/1
https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
https://www.openssl.org/news/secadv/20240109.txt

Comment 1 TEJ RATHI 2024-01-10 05:40:44 UTC
Created edk2 tracking bugs for this issue:

Affects: fedora-all [bug 2257574]


Created mingw-openssl tracking bugs for this issue:

Affects: fedora-all [bug 2257575]


Created openssl tracking bugs for this issue:

Affects: fedora-all [bug 2257576]


Created openssl3 tracking bugs for this issue:

Affects: epel-all [bug 2257573]

Comment 5 Mauro Matteo Cascella 2024-04-17 09:28:03 UTC
Created mysql8.0 tracking bugs for this issue:

Affects: fedora-all [bug 2275461]

Comment 7 errata-xmlrpc 2024-04-30 10:52:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2447 https://access.redhat.com/errata/RHSA-2024:2447