LibreSSL 2.9.1 through 3.2.1 has a heap-based buffer over-read in do_print_ex (called from asn1_item_print_ctx and ASN1_item_print).
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13914 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libressl/OSV-2020-1923.yaml | Third Party Advisory |
https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
08 Jul 2021, 12:31
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 7.1 |
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:openbsd:libressl:*:*:*:*:*:*:*:* |
|
References | (MISC) https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a - Patch, Third Party Advisory | |
References | (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13914 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libressl/OSV-2020-1923.yaml - Third Party Advisory |
01 Jul 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-01 03:15
Updated : 2024-02-04 21:47
NVD link : CVE-2019-25048
Mitre link : CVE-2019-25048
CVE.ORG link : CVE-2019-25048
JSON object : View
Products Affected
openbsd
- libressl
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read