[Pkg-openssl-devel] Bug#1085378: openssl: CVE-2024-9143
Moritz Mühlenhoff
jmm at inutil.org
Fri Oct 18 18:08:56 BST 2024
Source: openssl
X-Debbugs-CC: team at security.debian.org
Severity: normal
Tags: security
Hi,
The following vulnerability was published for openssl.
CVE-2024-9143[0]:
| Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with
| untrusted explicit values for the field polynomial can lead to out-
| of-bounds memory reads or writes. Impact summary: Out of bound
| memory writes can lead to an application crash or even a possibility
| of a remote code execution, however, in all the protocols involving
| Elliptic Curve Cryptography that we're aware of, either only "named
| curves" are supported, or, if explicit curve parameters are
| supported, they specify an X9.62 encoding of binary (GF(2^m)) curves
| that can't represent problematic input values. Thus the likelihood
| of existence of a vulnerable application is low. In particular, the
| X9.62 encoding is used for ECC keys in X.509 certificates, so
| problematic inputs cannot occur in the context of processing X.509
| certificates. Any problematic use-cases would have to be using an
| "exotic" curve encoding. The affected APIs include:
| EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various
| supporting BN_GF2m_*() functions. Applications working with
| "exotic" explicit binary (GF(2^m)) curve parameters, that make it
| possible to represent invalid field polynomials with a zero constant
| term, via the above or similar APIs, may terminate abruptly as a
| result of reading or writing outside of array bounds. Remote code
| execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2,
| 3.1 and 3.0 are not affected by this issue.
https://openssl-library.org/news/secadv/20241016.txt
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2024-9143
https://www.cve.org/CVERecord?id=CVE-2024-9143
Please adjust the affected versions in the BTS as needed.
More information about the Pkg-openssl-devel
mailing list