NULL Pointer Dereference Affecting openssl-devel package, versions <1:3.0.1-47.el9_1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-OPENSSLDEVEL-5607613
- published 28 May 2023
- disclosed 28 Feb 2023
Introduced: 28 Feb 2023
CVE-2023-0216 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
openssl-devel
to version 1:3.0.1-47.el9_1 or higher.
This issue was patched in ALSA-2023:0946
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-devel
package and not the openssl-devel
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions.
The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data.
References
- https://errata.almalinux.org/9/ALSA-2023-0946.html
- https://access.redhat.com/security/cve/CVE-2023-0216
- https://access.redhat.com/errata/RHSA-2023:0946
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=934a04f0e775309cadbef0aa6b9692e1b12a76c6
- https://security.gentoo.org/glsa/202402-08
- https://www.openssl.org/news/secadv/20230207.txt