Bugzilla – Bug 1213450
VUL-0: CVE-2020-23910: asn1c: stack-based buffer overflow vulnerability in asn1c through v0.9.28 via function genhash_get in genhash.c.
Last modified: 2024-04-18 09:24:40 UTC
CVE-2020-23910 Stack-based buffer overflow vulnerability in asn1c through v0.9.28 via function genhash_get in genhash.c. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23910 https://www.cve.org/CVERecord?id=CVE-2020-23910 https://github.com/vlm/asn1c/issues/396
No fix upstream yet. Affected: - SUSE:SLE-15:Update - openSUSE:Factory
SLE is unaffected, we don't ship asn1c, only code generated by asn1c AFAIK. Also generally problems from compiling untrusted code cannot be considered very serious vulnerability.
python3-asn1crypto Basesystem Module (sle-module-basesystem/15.4/x86_64) SUSEConnect --product sle-module-basesystem/15.4/x86_64 libasn1c-devel SUSE Package Hub (PackageHub/15.4/x86_64) SUSEConnect --product PackageHub/15.4/x86_64 libasn1c1 SUSE Package Hub (PackageHub/15.4/x86_64) SUSEConnect --product PackageHub/15.4/x86_64 asn1c SUSE Package Hub (PackageHub/15.4/x86_64) SUSEConnect --product PackageHub/15.4/x86_64 python3-asn1crypto Installed python3-asn1crypto Available in repo Basesystem_Module_15_SP4_x86_64:SLE-Module-Basesystem15-SP4-Pool
It was reported almost 3 years ago and nothing was done about it upstream. I don't see anything happening on our side as realistic other than acknowledging that the problem exists. It does not have severity assigned either after 3 years so if anything it's a candidate for dispute.
(In reply to Michal Suchanek from comment #2) > SLE is unaffected, we don't ship asn1c, only code generated by asn1c AFAIK. Indeed, thanks for pointing. Let's just close it
done