Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 225461 (CVE-2008-1673) - Kernel < asn1: additional sanity checking during BER decoding (CVE-2008-1673)
Summary: Kernel < asn1: additional sanity checking during BER decoding (CVE-20...
Alias: CVE-2008-1673
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
Whiteboard: [linux >2.6.23 <]
Depends on:
Reported: 2008-06-08 22:28 UTC by Robert Buchholz (RETIRED)
Modified: 2013-09-05 03:39 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-06-08 22:28:17 UTC
asn1: additional sanity checking during BER decoding (CVE-2008-1673)

upstream commit: ddb2c43594f22843e9f3153da151deaba1a834c5

- Don't trust a length which is greater than the working buffer.
  An invalid length could cause overflow when calculating buffer size
  for decoding oid.

- An oid length of zero is invalid and allows for an off-by-one error when
  decoding oid because the first subid actually encodes first 2 subids.

- A primitive encoding may not have an indefinite length.

Thanks to Wei Wang from McAfee for report.
Comment 1 into-the-trash-it-goes 2009-07-20 19:01:24 UTC
hardened-kernel unaffected at present time. Removing alias.

PS: Anything using >=genpatches-2.6.25-6 is unaffected