CVE-2023-1255
Publication date 20 April 2023
Last updated 4 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service. If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| openssl1.0 | 25.10 questing | Not in release | 
| 25.04 plucky | Not in release | |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal | Not in release | |
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| edk2 | 25.10 questing | 
                                Not affected 
                                
                               | 
| 25.04 plucky | 
                                Not affected 
                                
                               | |
| 24.04 LTS noble | 
                                Not affected 
                                
                               | |
| 22.04 LTS jammy | 
                                Not affected 
                                
                               | |
| 20.04 LTS focal | 
                                Not affected 
                                
                               | |
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | Ignored end of standard support | |
| nodejs | 25.10 questing | 
                                Not affected 
                                
                               | 
| 25.04 plucky | 
                                Not affected 
                                
                               | |
| 24.04 LTS noble | 
                                Not affected 
                                
                               | |
| 22.04 LTS jammy | 
                                Vulnerable 
                                
                               | |
| 20.04 LTS focal | 
                                Not affected 
                                
                               | |
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | 
                                Not affected 
                                
                               | |
| openssl | 25.10 questing | 
                                Fixed 3.0.8-1ubuntu3 
                                
                               | 
| 25.04 plucky | 
                                Fixed 3.0.8-1ubuntu3 
                                
                               | |
| 24.04 LTS noble | 
                                Fixed 3.0.8-1ubuntu3 
                                
                               | |
| 22.04 LTS jammy | 
                                Fixed 3.0.2-0ubuntu1.10 
                                
                               | |
| 20.04 LTS focal | 
                                Not affected 
                                
                               | |
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | 
                                Not affected 
                                
                               | 
Notes
Patch details
| Package | Patch details | 
|---|---|
| openssl | 
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score |  | 
| Attack vector | Network | 
| Attack complexity | High | 
| Privileges required | None | 
| User interaction | None | 
| Scope | Unchanged | 
| Confidentiality | None | 
| Integrity impact | None | 
| Availability impact | High | 
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H | 
References
Related Ubuntu Security Notices (USN)
- USN-6119-1
- OpenSSL vulnerabilities
- 30 May 2023