OpenSSL 1.1.1u

Problem Description 

Various components, such as Python, use OpenSSL version 1.1.1u internally. As no newer versions are yet released/available for these components, the associated vulnerability CVE-2023-4807 cannot be removed. 

The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. 

If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences up to data corruption and control of the application process. 

Connected CVE's 

The following vulnerabilities are associated with the components. 

A detailed description of the CVE's can be found here.

  

Database 
CVE 
Score 
Classification 

NVD 

CVE-2023-4807 

7.8 

High 

  

Affected Products / Affected Versions 

Real-Time-Testing Release 2022-A, 2022-B, 2023-A, 2023-B 

Solution 

The provided script sets the environment variable OPENSSL_ia32cap and deactivates the AVX512-IFMA instructions support of the CPU. 

The environment variable OPENSSL_ia32cap is used by OpenSSL to control the functions accessing specific processor instruction set extensions. It allows for the management of certain instruction set extensions on processors that support them. Generally, this variable is used to set specific CPU features to adjust performance or supported instruction set extensions, such as SSE (Streaming SIMD Extensions) or AES-NI (Advanced Encryption Standard New Instructions). By setting this variable, you can influence the use of certain hardware capabilities for cryptographic operations within OpenSSL. 

You can run the script any time to set the environment variable. The undo script removes the variable from the system. 

Limitations 

Without the CPU's AES-NI support, performance losses can occur when encrypting large amounts of data. 

  • openssl_1.1.1u_cve-2023-4807.ps1.zip ZIP, 0.3 KB
  • openssl_1.1.1u_cve-2023-4807_undo.ps1.zip ZIP, 0.3 KB
Tags
Date 2024-01-08
Product Real-Time Testing
Information Type Notifications
Information Category Product Security, Troubleshooting
dSPACE Release 2023-B, 2023-A, 2022-B, 2022-A

Drive innovation forward. Always on the pulse of technology development.

Subscribe to our expert knowledge. Learn from our successful project examples. Keep up to date on simulation and validation. Subscribe to/manage dSPACE direct and aerospace & defense now.

Enable form call

At this point, an input form from Click Dimensions is integrated. This enables us to process your newsletter subscription. The form is currently hidden due to your privacy settings for our website.

External input form

By activating the input form, you consent to personal data being transmitted to Click Dimensions within the EU, in the USA, Canada or Australia. More on this in our privacy policy.