[Bug 1860574] Re: [UBUNTU 20.04] zkey: Fix display of clear key size for XTS keys
Lukas Märdian
1860574 at bugs.launchpad.net
Tue Nov 17 14:15:01 UTC 2020
The 'zkey list' command does not seem to be available in Bionic
(s390-tools v2.3.0), so it looks like this bug isn't available either:
ubuntu at juju-96c787-test-0:~$ zkey list
zkey: Invalid command 'list'
Try 'zkey --help' for more information.
ubuntu at juju-96c787-test-0:~$ zkey --help
Usage: zkey COMMAND SECURE-KEY-FILE [OPTIONS]
Generate, re-encipher, and validate secure AES keys
COMMANDS
GENerate Generate a secure AES key
REencipher Re-encipher an existing secure AES key
VALidate Validate an existing secure AES key
COMMON OPTIONS
-V, --verbose Print additional information messages during processing
-h, --help Print this help, then exit
-v, --version Print version information, then exit
For more information use 'zkey COMMAND --help'.
ubuntu at juju-96c787-test-0:~$ zkey -v
zkey version 2.3.0-build-20191025
Copyright IBM Corp. 2017
** Changed in: s390-tools (Ubuntu Bionic)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to s390-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1860574
Title:
[UBUNTU 20.04] zkey: Fix display of clear key size for XTS keys
Status in Ubuntu on IBM z Systems:
In Progress
Status in s390-tools package in Ubuntu:
Fix Released
Status in s390-tools source package in Bionic:
Invalid
Status in s390-tools source package in Eoan:
Won't Fix
Status in s390-tools source package in Focal:
Fix Released
Bug description:
Description: zkey: Fix display of clear key size for XTS keys
Symptom: The 'zkey list' command shows bogus values for the
keys 'Clear key size' for XTS keys of type CCA-AESDATA
or CCA-AESCIPHER.
Problem: XTS keys consist of 2 keys concatenated to each other.
To calculate the clear key size, the clear key size of
both keys must be added. The code does not address the
second key correctly, and thus reads the clear key size
of the second key from an invalid memory location. This
results in bogus values reported as clear key size.
This bug has been introduced with feature "Cipher
key support" with commit 298fab68fee8 "zkey: Preparations
for introducing a new key type".
Solution: Correct the addressing of the second key.
Reproduction: Generate an XTS key of type CCA-AESDATA or CCA-AESCIPHER
and then run 'zkey list'.
Upstream commit:
https://github.com/ibm-s390-tools/s390-tools/commit/e7f446432b92b293e758099842843cfb1f18fa97
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1860574/+subscriptions
More information about the foundations-bugs
mailing list