fix CVE-2021-3449
This commit is contained in:
parent
240ea81a7b
commit
6fcf338c2e
47
CVE-2021-3449.patch
Normal file
47
CVE-2021-3449.patch
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
From fb9fa6b51defd48157eeb207f52181f735d96148 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Peter Kaestle <peter.kaestle@nokia.com>
|
||||||
|
Date: Mon, 15 Mar 2021 13:19:56 +0100
|
||||||
|
Subject: [PATCH] ssl sigalg extension: fix NULL pointer dereference
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=UTF-8
|
||||||
|
Content-Transfer-Encoding: 8bit
|
||||||
|
|
||||||
|
As the variable peer_sigalgslen is not cleared on ssl rehandshake, it's
|
||||||
|
possible to crash an openssl tls secured server remotely by sending a
|
||||||
|
manipulated hello message in a rehandshake.
|
||||||
|
|
||||||
|
On such a manipulated rehandshake, tls1_set_shared_sigalgs() calls
|
||||||
|
tls12_shared_sigalgs() with the peer_sigalgslen of the previous
|
||||||
|
handshake, while the peer_sigalgs has been freed.
|
||||||
|
As a result tls12_shared_sigalgs() walks over the available
|
||||||
|
peer_sigalgs and tries to access data of a NULL pointer.
|
||||||
|
|
||||||
|
This issue was introduced by c589c34e61 (Add support for the TLS 1.3
|
||||||
|
signature_algorithms_cert extension, 2018-01-11).
|
||||||
|
|
||||||
|
Signed-off-by: Peter Kästle <peter.kaestle@nokia.com>
|
||||||
|
Signed-off-by: Samuel Sapalski <samuel.sapalski@nokia.com>
|
||||||
|
|
||||||
|
CVE-2021-3449
|
||||||
|
|
||||||
|
CLA: trivial
|
||||||
|
|
||||||
|
Reviewed-by: Tomas Mraz <tomas@openssl.org>
|
||||||
|
Reviewed-by: Paul Dale <pauli@openssl.org>
|
||||||
|
Reviewed-by: Matt Caswell <matt@openssl.org>
|
||||||
|
---
|
||||||
|
ssl/statem/extensions.c | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/ssl/statem/extensions.c b/ssl/statem/extensions.c
|
||||||
|
index b055935d697b..4aed508d0f03 100644
|
||||||
|
--- a/ssl/statem/extensions.c
|
||||||
|
+++ b/ssl/statem/extensions.c
|
||||||
|
@@ -1139,6 +1139,7 @@ static int init_sig_algs(SSL *s, unsigned int context)
|
||||||
|
/* Clear any signature algorithms extension received */
|
||||||
|
OPENSSL_free(s->s3->tmp.peer_sigalgs);
|
||||||
|
s->s3->tmp.peer_sigalgs = NULL;
|
||||||
|
+ s->s3->tmp.peer_sigalgslen = 0;
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
@ -2,7 +2,7 @@
|
|||||||
Name: openssl
|
Name: openssl
|
||||||
Epoch: 1
|
Epoch: 1
|
||||||
Version: 1.1.1f
|
Version: 1.1.1f
|
||||||
Release: 4
|
Release: 5
|
||||||
Summary: Cryptography and SSL/TLS Toolkit
|
Summary: Cryptography and SSL/TLS Toolkit
|
||||||
License: OpenSSL and SSLeay
|
License: OpenSSL and SSLeay
|
||||||
URL: https://www.openssl.org/
|
URL: https://www.openssl.org/
|
||||||
@ -19,6 +19,7 @@ Patch8: CVE-2020-1971-0005-Add-a-test-for-GENERAL_NAME_cmp.patch
|
|||||||
Patch9: CVE-2020-1971-0006-Add-a-test-for-encoding-decoding-using-an-invalid-AS.patch
|
Patch9: CVE-2020-1971-0006-Add-a-test-for-encoding-decoding-using-an-invalid-AS.patch
|
||||||
Patch10: CVE-2021-23840.patch
|
Patch10: CVE-2021-23840.patch
|
||||||
Patch11: CVE-2021-23841.patch
|
Patch11: CVE-2021-23841.patch
|
||||||
|
Patch12: CVE-2021-3449.patch
|
||||||
|
|
||||||
BuildRequires: gcc make lksctp-tools-devel coreutils util-linux zlib-devel
|
BuildRequires: gcc make lksctp-tools-devel coreutils util-linux zlib-devel
|
||||||
|
|
||||||
@ -195,6 +196,9 @@ make test || :
|
|||||||
%{_pkgdocdir}/html/
|
%{_pkgdocdir}/html/
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Apr 7 2021 openEuler Buildteam <buildteam@openeuler.org> - 1:1.1.1f-5
|
||||||
|
- fix CVE-2021-3449
|
||||||
|
|
||||||
* Wed Mar 10 2021 openEuler Buildteam <buildteam@openeuler.org> - 1:1.1.1f-4
|
* Wed Mar 10 2021 openEuler Buildteam <buildteam@openeuler.org> - 1:1.1.1f-4
|
||||||
- fix CVE-2021-23840 and CVE-2021-23841
|
- fix CVE-2021-23840 and CVE-2021-23841
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user