Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 548252 (CVE-2015-3622) - <dev-libs/libtasn1-4.5: invalid memory access (CVE-2015-3622)
Summary: <dev-libs/libtasn1-4.5: invalid memory access (CVE-2015-3622)
Status: RESOLVED FIXED
Alias: CVE-2015-3622
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: A2 [glsa cve]
Keywords:
Depends on:
Blocks: CVE-2015-2806
  Show dependency tree
 
Reported: 2015-04-30 13:42 UTC by Agostino Sarubbo
Modified: 2015-09-24 17:00 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-04-30 13:42:32 UTC
From ${URL} :

https://blog.fuzzing-project.org/9-Heap-overflow-invalid-read-in-Libtasn1-TFPA-0052015.html

While fuzzing GnuTLS I discovered a malformed certificate input sample
that would cause a heap overflow read of 99 bytes in the DER decoding
functions of Libtasn1. The heap overflow happens in the function
_asn1_extract_der_octet().

This issue was reported to the Libtasn1 developer on 16th April. A fix
was committed on 20th April and is part of the Libtasn1 4.5 release.
This issue was found with american fuzzy lop and address sanitizer.

http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commitdiff;h=f979435823a02f842c41d49cd41cc81f25b5d677
Git commit / fix

https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html
Libtasn1 4.5 release notes

https://crashes.fuzzing-project.org/TFPA-2015-005-libtasn1-4.4-heap-overflow.crt
Sample malformed certificate exposing heap overflow (test with
certtool -i --inder --infile=[sample] and address sanitizer or
valgrind)



@maintainer(s): since the fixed package is already in the tree, please let us know if it is ready for the stabilization or not.
Comment 1 Alon Bar-Lev (RETIRED) gentoo-dev 2015-04-30 13:57:50 UTC
can be stabilized, please resolve/dup bug#544922 to avoid duplication.
Comment 2 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-04-30 17:44:20 UTC
Arches please stabilize:
=dev-libs/libtasn1-4.5
Stable targets: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2015-05-01 04:26:55 UTC
Stable for PPC64.
Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2015-05-01 04:40:39 UTC
Stable for HPPA.
Comment 5 Agostino Sarubbo gentoo-dev 2015-05-04 10:07:12 UTC
amd64 stable
Comment 6 Jack Morgan (RETIRED) gentoo-dev 2015-05-13 05:43:42 UTC
ia64 stable
Comment 7 Jack Morgan (RETIRED) gentoo-dev 2015-05-13 06:34:11 UTC
sparc stable
Comment 8 Jack Morgan (RETIRED) gentoo-dev 2015-05-13 06:48:44 UTC
ppc stable
Comment 9 Agostino Sarubbo gentoo-dev 2015-05-19 07:25:31 UTC
x86 stable
Comment 10 Matt Turner gentoo-dev 2015-05-20 00:37:15 UTC
alpha stable
Comment 11 Agostino Sarubbo gentoo-dev 2015-05-27 13:02:08 UTC
arm stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 12 Alon Bar-Lev (RETIRED) gentoo-dev 2015-05-27 14:16:55 UTC
(In reply to Agostino Sarubbo from comment #11)
> arm stable.
> 
> Maintainer(s), please cleanup.
> Security, please add it to the existing request, or file a new one.

done
Comment 13 Yury German Gentoo Infrastructure gentoo-dev 2015-05-28 20:52:19 UTC
Arches and Maintainer(s), Thank you for your work.

New GLSA Request filed.
Comment 14 GLSAMaker/CVETool Bot gentoo-dev 2015-05-28 20:56:24 UTC
CVE-2015-3622 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3622):
  The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1
  before 4.5 allows remote attackers to cause a denial of service
  (out-of-bounds heap read) via a crafted certificate.
Comment 15 GLSAMaker/CVETool Bot gentoo-dev 2015-09-24 17:00:57 UTC
This issue was resolved and addressed in
 GLSA 201509-04 at https://security.gentoo.org/glsa/201509-04
by GLSA coordinator Kristian Fiskerstrand (K_F).