From 3cfb897093dded980bd0de3eaed25e1e9b31b5b2 Mon Sep 17 00:00:00 2001 From: Alexis Mousset Date: Tue, 7 Feb 2023 21:07:48 +0100 Subject: [PATCH] Add CVE-2023-0217 for openssl-src (#1583) --- crates/openssl-src/RUSTSEC-0000-0000.md | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 crates/openssl-src/RUSTSEC-0000-0000.md diff --git a/crates/openssl-src/RUSTSEC-0000-0000.md b/crates/openssl-src/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..529a782 --- /dev/null +++ b/crates/openssl-src/RUSTSEC-0000-0000.md @@ -0,0 +1,25 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "openssl-src" +aliases = ["CVE-2023-0217"] +categories = ["denial-of-service"] +date = "2023-02-07" +url = "https://www.openssl.org/news/secadv/20230207.txt" +[versions] +patched = [">= 300.0.12"] +unaffected = ["< 300.0.0"] +``` + +# `NULL` dereference validating DSA public key + +An invalid pointer dereference on read can be triggered when an +application tries to check a malformed DSA public key by the +`EVP_PKEY_public_check()` function. This will most likely lead +to an application crash. This function can be called on public +keys supplied from untrusted sources which could allow an attacker +to cause a denial of service attack. + +The TLS implementation in OpenSSL does not call this function +but applications might call the function if there are additional +security requirements imposed by standards such as FIPS 140-3.