Public bug reported:

Description:   zkey: Fix display of clear key size for XTS keys
Symptom:       The 'zkey list' command shows bogus values for the
               keys 'Clear key size' for XTS keys of type CCA-AESDATA
               or CCA-AESCIPHER.
Problem:       XTS keys consist of 2 keys concatenated to each other.
               To calculate the clear key size, the clear key size of
               both keys must be added. The code does not address the
               second key correctly, and thus reads the clear key size
               of the second key from an invalid memory location. This
               results in bogus values reported as clear key size.
               This bug has been introduced with feature "Cipher
               key support" with commit 298fab68fee8 "zkey: Preparations 
               for introducing a new key type".
Solution:      Correct the addressing of the second key.
Reproduction:  Generate an XTS key of type CCA-AESDATA or CCA-AESCIPHER
               and then run 'zkey list'.

Upstream commit:
https://github.com/ibm-s390-tools/s390-tools/commit/e7f446432b92b293e758099842843cfb1f18fa97

** Affects: linux (Ubuntu)
     Importance: Undecided
     Assignee: Skipper Bug Screeners (skipper-screen-team)
         Status: New


** Tags: architecture-s39064 bugnameltc-183404 severity-high 
targetmilestone-inin2004

** Tags added: architecture-s39064 bugnameltc-183404 severity-high
targetmilestone-inin2004

** Changed in: ubuntu
     Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1860574

Title:
  [UBUNTU 20.04] zkey: Fix display of clear key size for XTS keys

Status in linux package in Ubuntu:
  New

Bug description:
  Description:   zkey: Fix display of clear key size for XTS keys
  Symptom:       The 'zkey list' command shows bogus values for the
                 keys 'Clear key size' for XTS keys of type CCA-AESDATA
                 or CCA-AESCIPHER.
  Problem:       XTS keys consist of 2 keys concatenated to each other.
                 To calculate the clear key size, the clear key size of
                 both keys must be added. The code does not address the
                 second key correctly, and thus reads the clear key size
                 of the second key from an invalid memory location. This
                 results in bogus values reported as clear key size.
                 This bug has been introduced with feature "Cipher
                 key support" with commit 298fab68fee8 "zkey: Preparations 
                 for introducing a new key type".
  Solution:      Correct the addressing of the second key.
  Reproduction:  Generate an XTS key of type CCA-AESDATA or CCA-AESCIPHER
                 and then run 'zkey list'.

  Upstream commit:
  
https://github.com/ibm-s390-tools/s390-tools/commit/e7f446432b92b293e758099842843cfb1f18fa97

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860574/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to