Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 922929 - dev-libs/openssl: PKCS12 Decoding crashes
Summary: dev-libs/openssl: PKCS12 Decoding crashes
Status: RESOLVED DUPLICATE of bug 921684
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://www.openssl.org/news/secadv/2...
Whiteboard: A3 [upstream/ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2024-01-25 22:50 UTC by Christopher Fore
Modified: 2024-02-03 21:15 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-01-25 22:50:22 UTC
CVE-2024-0727:

Processing a maliciously formatted PKCS12 file may lead OpenSSL
to crash leading to a potential Denial of Service attack

Impact summary: Applications loading files in the PKCS12 format from untrusted
sources might terminate abruptly.

A file in PKCS12 format can contain certificates and keys and may come from an
untrusted source. The PKCS12 specification allows certain fields to be NULL, but
OpenSSL does not correctly check for this case. This can lead to a NULL pointer
dereference that results in OpenSSL crashing. If an application processes PKCS12
files from an untrusted source using the OpenSSL APIs then that application will
be vulnerable to this issue.

OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
and PKCS12_newpass().


The above is fixed in 3.2.1, 3.1.5, and 3.0.13 once they are released.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2024-02-03 21:15:13 UTC
These fixes are also covered by the fix versions in bug 921684, let's handle this one there too.

*** This bug has been marked as a duplicate of bug 921684 ***