当前仓库属于暂停状态,部分功能使用受限,详情请查阅 仓库状态说明
8 Star 5 Fork 17

openGauss/security
暂停

CVE-2023-4807

已取消
缺陷 成员
创建于  
2023-09-08 20:29

一、漏洞信息
漏洞编号:CVE-2023-4807
漏洞归属组件:security
漏洞归属的版本:1.1.1n
CVSS V3.0分值:
BaseScore:7.8 High
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞简述:
Issue summary: The POLY1305 MAC (message authentication code) implementationcontains a bug that might corrupt the internal state of applications on theWindows 64 platform when running on newer X86_64 processors supporting theAVX512-IFMA instructions.Impact summary: If in an application that uses the OpenSSL library an attackercan influence whether the POLY1305 MAC algorithm is used, the applicationstate might be corrupted with various application dependent consequences.The POLY1305 MAC (message authentication code) implementation in OpenSSL doesnot save the contents of non-volatile XMM registers on Windows 64 platformwhen calculating the MAC of data larger than 64 bytes. Before returning tothe caller all the XMM registers are set to zero rather than restoring theirprevious content. The vulnerable code is used only on newer x86_64 processorssupporting the AVX512-IFMA instructions.The consequences of this kind of internal application state corruption canbe various - from no consequences, if the calling application does notdepend on the contents of non-volatile XMM registers at all, to the worstconsequences, where the attacker could get complete control of the applicationprocess. However given the contents of the registers are just zeroized sothe attacker cannot put arbitrary values inside, the most likely consequence,if any, would be an incorrect result of some application dependentcalculations or a crash leading to a denial of service.The POLY1305 MAC algorithm is most frequently used as part of theCHACHA20-POLY1305 AEAD (authenticated encryption with associated data)algorithm. The most common usage of this AEAD cipher is with TLS protocolversions 1.2 and 1.3 and a malicious client can influence whether this AEADcipher is used by the server. This implies that server applications usingOpenSSL can be potentially impacted. However we are currently not aware ofany concrete application that would be affected by this issue therefore weconsider this a Low severity security issue.As a workaround the AVX512-IFMA instructions support can be disabled atruntime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000The FIPS provider is not affected by this issue.
漏洞公开时间:2023-09-08 20:15:00
漏洞创建时间:2023-09-08 20:29:38
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2023-4807

更多参考(点击展开)
参考来源 参考链接 来源链接
openssl-security.openssl.org https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5
openssl-security.openssl.org https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6754de4a121ec7f261b16723180df6592cbb4508
openssl-security.openssl.org https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a632d534c73eeb3e3db8c7540d811194ef7c79ff
openssl-security.openssl.org https://www.openssl.org/news/secadv/20230908.txt
suse_bugzilla https://www.openssl.org/news/secadv/20230908.txt https://bugzilla.suse.com/show_bug.cgi?id=1215170
redhat_bugzilla https://www.openssl.org/news/secadv/20230908.txt https://bugzilla.redhat.com/show_bug.cgi?id=2238009
cve_search https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a632d534c73eeb3e3db8c7540d811194ef7c79ff
cve_search https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5
cve_search https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6754de4a121ec7f261b16723180df6592cbb4508
cve_search https://www.openssl.org/news/secadv/20230908.txt
cve_search http://www.openwall.com/lists/oss-security/2023/09/08/1
cve_search http://www.openwall.com/lists/oss-security/2023/09/08/3
cve_search http://packetstormsecurity.com/files/174593/OpenSSL-Security-Advisory-20230908.html
amazon_linux_explore https://access.redhat.com/security/cve/CVE-2023-4807 https://explore.alas.aws.amazon.com/CVE-2023-4807.html
amazon_linux_explore https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4807 https://explore.alas.aws.amazon.com/CVE-2023-4807.html
snyk https://github.com/openssl/openssl/commit/4bfac4471f53c4f74c8d81020beb938f92d84ca5 https://security.snyk.io/vuln/SNYK-UNMANAGED-OPENSSL-5891065
snyk https://github.com/openssl/openssl/commit/6754de4a121ec7f261b16723180df6592cbb4508 https://security.snyk.io/vuln/SNYK-UNMANAGED-OPENSSL-5891065
snyk https://github.com/openssl/openssl/commit/a632d534c73eeb3e3db8c7540d811194ef7c79ff https://security.snyk.io/vuln/SNYK-UNMANAGED-OPENSSL-5891065
snyk https://bugzilla.redhat.com/show_bug.cgi?id=2238009 https://security.snyk.io/vuln/SNYK-UNMANAGED-OPENSSL-5891065
snyk https://www.openssl.org/news/secadv/20230908.txt https://security.snyk.io/vuln/SNYK-UNMANAGED-OPENSSL-5891065
openssl-security.openssl.org https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5
openssl-security.openssl.org https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6754de4a121ec7f261b16723180df6592cbb4508
openssl-security.openssl.org https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a632d534c73eeb3e3db8c7540d811194ef7c79ff
openssl-security.openssl.org https://www.openssl.org/news/secadv/20230908.txt
openssl-security.openssl.org http://packetstormsecurity.com/files/174593/OpenSSL-Security-Advisory-20230908.html
openssl-security.openssl.org http://www.openwall.com/lists/oss-security/2023/09/08/1
openssl-security.openssl.org http://www.openwall.com/lists/oss-security/2023/09/08/3

漏洞分析指导链接:
https://gitee.com/opengauss/security/blob/master/cve/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5 openssl-security.openssl.org
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6754de4a121ec7f261b16723180df6592cbb4508 openssl-security.openssl.org
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a632d534c73eeb3e3db8c7540d811194ef7c79ff openssl-security.openssl.org
https://github.com/openssl/openssl/commit/4bfac4471f53c4f74c8d81020beb938f92d84ca5 snyk
https://github.com/openssl/openssl/commit/6754de4a121ec7f261b16723180df6592cbb4508 snyk
https://github.com/openssl/openssl/commit/a632d534c73eeb3e3db8c7540d811194ef7c79ff snyk

二、漏洞分析结构反馈
影响性分析说明:
该漏洞只涉及windows x86_64平台,openGauss不涉及
openGauss评分:
7.8
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.master:不受影响

评论 (5)

opengauss-bot 创建了缺陷 2年前
opengauss-bot 添加了
 
CVE/UNFIXED
标签
2年前
展开全部操作日志
opengauss_bot 添加了
 
sig/security
标签
2年前
opengauss-bot 修改了描述 2年前
opengauss-bot 修改了描述 2年前
opengauss-bot 修改了描述 2年前
opengauss-bot 修改了描述 2年前
opengauss-bot 修改了描述 2年前
opengauss-bot 修改了描述 2年前
opengauss-bot 修改了描述 2年前
opengauss-bot 修改了描述 2年前
jiexiao1413 关联项目设置为openGauss 5.1.0 community 2年前
蒋宏博 计划开始日期设置为2023-09-11 2年前
蒋宏博 计划截止日期设置为2023-09-11 2年前
蒋宏博 计划截止日期2023-09-11 修改为2023-09-30 2年前
蒋宏博 计划截止日期2023-09-30 修改为2023-09-16 2年前
蒋宏博 修改了备注 2年前
Will 添加协作者周斌 2年前
opengauss-bot 修改了描述 2年前
opengauss-bot 修改了描述 2年前
opengauss-bot 修改了描述 2年前
蒋宏博 计划截止日期2023-09-16 修改为2023-09-18 2年前
蒋宏博 计划开始日期2023-09-11 修改为2023-09-18 2年前
蒋宏博 计划截止日期2023-09-18 修改为2023-09-21 2年前
蒋宏博 修改了备注 2年前
蒋宏博 修改了备注 2年前
opengauss-bot 修改了描述 2年前

影响性分析说明:
该漏洞只涉及windows x86_64平台,openGauss不涉及
openGauss评分:
BaseScore:0.0 Low
Vector:CVSS:2.0/
受影响版本排查(受影响/不受影响):
1.master:不受影响

opengauss-bot 修改了描述 2年前
蒋宏博 任务状态待办的 修改为已取消 2年前
opengauss-bot 移除了
 
CVE/UNFIXED
标签
2年前
opengauss-bot 移除了
 
sig/security
标签
2年前
opengauss-bot 添加了
 
CVE/UNFIXED
标签
2年前
opengauss-bot 添加了
 
sig/security
标签
2年前

登录 后才可以发表评论

状态
负责人
项目
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
预计工期 (小时)
开始日期   -   截止日期
-
置顶选项
优先级
预警问题
是否回合
回合版本
回合自检情况
未设置
确定
提单组织
客户名称
里程碑
分支
组织
组织
确定
故障现象
问题故障现象
确定
用例发现
备注
9.18:待分析
确定
开发领域
开发改进-改进措施
开发改进-改进措施
确定
开发改进-输出件归档
开发改进-输出件归档
确定
故障概率
开发是否复现
测试领域
测试责任人
测试责任人
子特性
问题归属自特性
确定
问题详情
问题原因详情
确定
需求引入问题
是填需求ISSUE ID;其他填否
确定
转测后遗漏问题
是否分析
关键日志
问题定位关键日志
确定
问题引入阶段
问题出现阶段
问题引入版本
测试是否复现
问题发生分类
测试改进-改进措施
测试改进措施
确定
测试改进-输出件归档
测试改进输出件归档
确定
参与者(4)
5622128 opengauss bot 1581905080 13084139 opengauss bot 1686829535 蒋宏博-hwhbj 周斌-justbk
1
https://gitee.com/opengauss/security.git
git@gitee.com:opengauss/security.git
opengauss
security
security

搜索帮助