Public bug reported: Description: zkey: Fix display of clear key size for XTS keys Symptom: The 'zkey list' command shows bogus values for the keys 'Clear key size' for XTS keys of type CCA-AESDATA or CCA-AESCIPHER. Problem: XTS keys consist of 2 keys concatenated to each other. To calculate the clear key size, the clear key size of both keys must be added. The code does not address the second key correctly, and thus reads the clear key size of the second key from an invalid memory location. This results in bogus values reported as clear key size. This bug has been introduced with feature "Cipher key support" with commit 298fab68fee8 "zkey: Preparations for introducing a new key type". Solution: Correct the addressing of the second key. Reproduction: Generate an XTS key of type CCA-AESDATA or CCA-AESCIPHER and then run 'zkey list'.
Upstream commit: https://github.com/ibm-s390-tools/s390-tools/commit/e7f446432b92b293e758099842843cfb1f18fa97 ** Affects: linux (Ubuntu) Importance: Undecided Assignee: Skipper Bug Screeners (skipper-screen-team) Status: New ** Tags: architecture-s39064 bugnameltc-183404 severity-high targetmilestone-inin2004 ** Tags added: architecture-s39064 bugnameltc-183404 severity-high targetmilestone-inin2004 ** Changed in: ubuntu Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team) ** Package changed: ubuntu => linux (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1860574 Title: [UBUNTU 20.04] zkey: Fix display of clear key size for XTS keys Status in linux package in Ubuntu: New Bug description: Description: zkey: Fix display of clear key size for XTS keys Symptom: The 'zkey list' command shows bogus values for the keys 'Clear key size' for XTS keys of type CCA-AESDATA or CCA-AESCIPHER. Problem: XTS keys consist of 2 keys concatenated to each other. To calculate the clear key size, the clear key size of both keys must be added. The code does not address the second key correctly, and thus reads the clear key size of the second key from an invalid memory location. This results in bogus values reported as clear key size. This bug has been introduced with feature "Cipher key support" with commit 298fab68fee8 "zkey: Preparations for introducing a new key type". Solution: Correct the addressing of the second key. Reproduction: Generate an XTS key of type CCA-AESDATA or CCA-AESCIPHER and then run 'zkey list'. Upstream commit: https://github.com/ibm-s390-tools/s390-tools/commit/e7f446432b92b293e758099842843cfb1f18fa97 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860574/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp