First published: Tue Jan 23 2024(Updated: )
PKCS12 structures contain PKCS7 ContentInfo fields. These fields are optional and can be NULL even if the "type" is a valid value. OpenSSL was not properly accounting for this and a NULL dereference can occur causing a crash. The OpenSSL project did announce a new release, which is assumed to contain this bug fix; that release will be published on Jan 30th. Reference: <a href="https://github.com/openssl/openssl/pull/23362">https://github.com/openssl/openssl/pull/23362</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2259944 is considered high due to the potential for application crashes.
To fix REDHAT-BUG-2259944, you should update to the latest version of OpenSSL where the issue has been addressed.
Systems using OpenSSL that handle PKCS12 structures may be affected by REDHAT-BUG-2259944.
Yes, REDHAT-BUG-2259944 affects OpenSSL versions that do not properly handle NULL dereferences in PKCS7 ContentInfo fields.
There is no official workaround for REDHAT-BUG-2259944, and the recommended action is to apply the provided patch in the new OpenSSL release.