compat-openssl11-1.1.1k-5.el9_7.1
エラータID: AXSA:2026-313:01
リリース日:
2026/03/16 Monday - 21:24
題名:
compat-openssl11-1.1.1k-5.el9_7.1
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- OpenSSL の PKCS12_get_friendlyname() 関数には、バッファサイズ
の算出処理に不備に起因したメモリ領域の範囲外書き込みの問題がある
ため、リモートの攻撃者により、細工された PKCS#12 形式のファイルの
処理を介して、情報の漏洩、データ破壊、およびサービス拒否攻撃などを
可能とする脆弱性が存在します。(CVE-2025-69419)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2025-69419
Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer. The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.
Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer. The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.
追加情報:
N/A
ダウンロード:
SRPMS
- compat-openssl11-1.1.1k-5.el9_7.1.src.rpm
MD5: 20d46acc4f9bf068a6b23c4b61a4ac60
SHA-256: 16fe6de625c6ff51bf7d0d8a0ae148a18cbfe4a083e83c87d4a60149569f33ab
Size: 7.28 MB
Asianux Server 9 for x86_64
- compat-openssl11-1.1.1k-5.el9_7.1.i686.rpm
MD5: 5c94676dc569284810520728fb1bf479
SHA-256: 3473f4c910418005b5b5714d92237327945baee51c3219867cf5e1d4eb82c4f5
Size: 1.44 MB - compat-openssl11-1.1.1k-5.el9_7.1.x86_64.rpm
MD5: 7c6dec087a523103ff8dd35278e01479
SHA-256: ffb756f0332290ebe06e12458f80d6d5ec6d5a55f418bdd86de4a145119ce140
Size: 1.45 MB