Bug 2072469 - Random memory overwrite
Summary: Random memory overwrite
Keywords:
Status: VERIFIED
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: cjose
Version: CentOS Stream
Hardware: All
OS: All
low
high
Target Milestone: rc
: ---
Assignee: Tomas Halman
QA Contact: Scott Poore
URL:
Whiteboard: sync-to-jira
Depends On:
Blocks: 2180445
TreeView+ depends on / blocked
 
Reported: 2022-04-06 11:22 UTC by nickgearls
Modified: 2023-07-12 17:28 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
: 2180445 (view as bug list)
Environment:
Last Closed:
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github cisco cjose issues 110 0 None open memory allocation error 2023-03-02 14:14:17 UTC
Red Hat Issue Tracker RHELPLAN-118046 0 None None None 2022-04-06 11:39:32 UTC
Red Hat Issue Tracker SSSD-4613 0 None None None 2022-04-25 19:43:11 UTC

Description nickgearls 2022-04-06 11:22:56 UTC
In jwe.c, on line 1952:
  cek = cjose_get_alloc()(cek_len);
  memcpy(cek, jwe->cek, cek_len);

allocation result is not checked. We should add (before memcpy):
  if (!cek) {
   CJOSE_ERROR(err, CJOSE_ERR_NO_MEMORY);
   return NULL;
  }

Bug registered at https://github.com/cisco/cjose/issues/110.

Cisco does not maintain this repo anymore; do you plan to maintain the package in Redhat?
For info, there's a fork trying to keep this software up-to-date (and it includes this patch): https://github.com/zmartzone/cjose/tree/version-0.6.2.x

Comment 3 Hans Zandbelt 2022-11-18 16:18:50 UTC
I'd also like to ask you to switch to the maintenance fork at https://github.com/zmartzone/cjose, as suggested before in https://github.com/cisco/cjose/issues/121 ; the parent project's last commit was 3.5 years ago, and issues no longer get addressed; for the record, Debian has made that switch https://salsa.debian.org/debian/cjose

Comment 4 Tomas Halman 2022-11-21 08:01:53 UTC
Sure Hans, I count on that.

Comment 5 nickgearls 2022-12-16 15:47:00 UTC
I switched to the maintenance fork, thanks for maintaining it

Comment 10 Scott Poore 2023-05-04 13:54:35 UTC
Verified.  Sanity only.

Version ::

cjose-0.6.1-3.module+el8.9.0+18395+74bc73c4.x86_64

mod_auth_openidc-2.4.9.4-5.module+el8.9.0+18723+672ccf5d.x86_64

Name             : mod_auth_openidc
Stream           : 2.3 [d][e][a]
Version          : 8090020230425101425
Context          : b46abd14
Architecture     : x86_64
Profiles         : default [d] [i]
Default profiles : default
Repo             : rhel-AppStream
Summary          : Apache module suporting OpenID Connect authentication
Description      : This module enables an Apache 2.x web server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Requires         : platform:[el8]
Artifacts        : cjose-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.src
                 : cjose-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.x86_64
                 : cjose-debuginfo-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.x86_64
                 : cjose-debugsource-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.x86_64
                 : cjose-devel-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.x86_64
                 : mod_auth_openidc-0:2.4.9.4-5.module+el8.9.0+18723+672ccf5d.src
                 : mod_auth_openidc-0:2.4.9.4-5.module+el8.9.0+18723+672ccf5d.x86_64
                 : mod_auth_openidc-debuginfo-0:2.4.9.4-5.module+el8.9.0+18723+672ccf5d.x86_64
                 : mod_auth_openidc-debugsource-0:2.4.9.4-5.module+el8.9.0+18723+672ccf5d.x86_64

Results ::

gating tests:
test_oidc.py ....                                                                               [100%]

-------------------- generated xml file: /root/federation_testing/result_oidc.xml ---------------------
====================================== 4 passed in 1.55 seconds =======================================

Comment 11 Hans Zandbelt 2023-07-12 17:28:31 UTC
FYI: there's another vulnerability that is fixed only in the maintenance fork https://github.com/OpenIDC/cjose/security/advisories/GHSA-3rhg-3gf2-6xgj which makes this update more urgent.


Note You need to log in before you can comment on or make changes to this bug.