CVE-2019-25048

LibreSSL 2.9.1 through 3.2.1 has a heap-based buffer over-read in do_print_ex (called from asn1_item_print_ctx and ASN1_item_print).
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:openbsd:libressl:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

08 Jul 2021, 12:31

Type Values Removed Values Added
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : 5.8
v3 : 7.1
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:libressl:*:*:*:*:*:*:*:*
References (MISC) https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a - (MISC) https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a - Patch, Third Party Advisory
References (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13914 - (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13914 - Exploit, Issue Tracking, Patch, Third Party Advisory
References (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libressl/OSV-2020-1923.yaml - (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libressl/OSV-2020-1923.yaml - Third Party Advisory

01 Jul 2021, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-01 03:15

Updated : 2024-02-04 21:47


NVD link : CVE-2019-25048

Mitre link : CVE-2019-25048

CVE.ORG link : CVE-2019-25048


JSON object : View

Products Affected

openbsd

  • libressl

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read