openssl/crypto/pkcs7
Tomas Mraz 6eebe6c023 pk7_doit.c: Check return of BIO_set_md() calls
These calls invoke EVP_DigestInit() which can fail for digests
with implicit fetches. Subsequent EVP_DigestUpdate() from BIO_write()
or EVP_DigestFinal() from BIO_read() will segfault on NULL
dereference. This can be triggered by an attacker providing
PKCS7 data digested with MD4 for example if the legacy provider
is not loaded.

If BIO_set_md() fails the md BIO cannot be used.

CVE-2023-0401

Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
2023-02-07 17:05:10 +01:00
..
bio_pk7.c pkcs7: Remove unused includes 2022-11-10 08:11:57 +11:00
build.info unified build scheme: add build.info files 2016-02-01 12:46:58 +01:00
pk7_asn1.c crypto/*: Fix various typos, repeated words, align some spelling to LDP. 2022-10-12 16:55:01 +11:00
pk7_attr.c Stop raising ERR_R_MALLOC_FAILURE in most places 2022-10-05 14:02:03 +02:00
pk7_doit.c pk7_doit.c: Check return of BIO_set_md() calls 2023-02-07 17:05:10 +01:00
pk7_lib.c Do not dereference PKCS7 object data if not set 2023-02-07 17:05:10 +01:00
pk7_local.h Add library context and property query support into the PKCS12 API 2021-04-30 09:15:50 +10:00
pk7_mime.c Teach more of the ASN.1 code about libctx/propq 2021-06-05 17:39:10 +10:00
pk7_smime.c Stop raising ERR_R_MALLOC_FAILURE in most places 2022-10-05 14:02:03 +02:00
pkcs7err.c Update copyright year 2021-06-17 13:24:59 +01:00