Update error checking for OpenSSL CMS_verify
Resolves: rhbz#2119704 Signed-off-by: Julien Rische <jrische@redhat.com>
This commit is contained in:
parent
56cee506e7
commit
603ad7099e
48
0010-Update-error-checking-for-OpenSSL-CMS_verify.patch
Normal file
48
0010-Update-error-checking-for-OpenSSL-CMS_verify.patch
Normal file
@ -0,0 +1,48 @@
|
||||
From 963314f4f449e136195232bdada3109af65d0881 Mon Sep 17 00:00:00 2001
|
||||
From: Julien Rische <jrische@redhat.com>
|
||||
Date: Thu, 28 Jul 2022 15:20:12 +0200
|
||||
Subject: [PATCH] Update error checking for OpenSSL CMS_verify
|
||||
|
||||
The code for CMS data verification was initially written for OpenSSL's
|
||||
PKCS7_verify() function. It now uses CMS_verify(), but error handling
|
||||
is still done using PKCS7_verify() error identifiers. Update the
|
||||
recognized error codes so that the KDC generates
|
||||
KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED errors when appropriate.
|
||||
Use ERR_peek_last_error() to observe the error generated closest to
|
||||
the API surface.
|
||||
|
||||
[ghudson@mit.edu: edited commit message]
|
||||
|
||||
ticket: 9069 (new)
|
||||
tags: pullup
|
||||
target_version: 1.20-next
|
||||
---
|
||||
src/plugins/preauth/pkinit/pkinit_crypto_openssl.c | 9 ++++++---
|
||||
1 file changed, 6 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
|
||||
index 1c2aa02827..16edf15cb2 100644
|
||||
--- a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
|
||||
+++ b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
|
||||
@@ -2102,12 +2102,15 @@ cms_signeddata_verify(krb5_context context,
|
||||
goto cleanup;
|
||||
out = BIO_new(BIO_s_mem());
|
||||
if (CMS_verify(cms, NULL, store, NULL, out, flags) == 0) {
|
||||
- unsigned long err = ERR_peek_error();
|
||||
+ unsigned long err = ERR_peek_last_error();
|
||||
switch(ERR_GET_REASON(err)) {
|
||||
- case PKCS7_R_DIGEST_FAILURE:
|
||||
+ case RSA_R_DIGEST_NOT_ALLOWED:
|
||||
+ case CMS_R_UNKNOWN_DIGEST_ALGORITHM:
|
||||
+ case CMS_R_NO_MATCHING_DIGEST:
|
||||
+ case CMS_R_NO_MATCHING_SIGNATURE:
|
||||
retval = KRB5KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED;
|
||||
break;
|
||||
- case PKCS7_R_SIGNATURE_FAILURE:
|
||||
+ case CMS_R_VERIFICATION_FAILURE:
|
||||
default:
|
||||
retval = KRB5KDC_ERR_INVALID_SIG;
|
||||
}
|
||||
--
|
||||
2.38.1
|
||||
|
@ -0,0 +1,28 @@
|
||||
From c7d2d7c090bc000acd67b358150b9487f606ff20 Mon Sep 17 00:00:00 2001
|
||||
From: Julien Rische <jrische@redhat.com>
|
||||
Date: Fri, 19 Aug 2022 10:34:52 +0200
|
||||
Subject: [PATCH] [downstream] Catch SHA-1 digest disallowed error for
|
||||
PKINIT
|
||||
|
||||
An OpenSSL patch causes EVP_R_INVALID_DIGEST error to be raised if
|
||||
CMS_verify is called to verify a SHA-1 signature. If this error is
|
||||
caught, it will now return KDC_ERR_DIGEST_IN_SIGNED_DATA_NOT_ACCEPTED.
|
||||
---
|
||||
src/plugins/preauth/pkinit/pkinit_crypto_openssl.c | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
|
||||
index 16edf15cb2..bfa3fe8e91 100644
|
||||
--- a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
|
||||
+++ b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
|
||||
@@ -2104,6 +2104,7 @@ cms_signeddata_verify(krb5_context context,
|
||||
if (CMS_verify(cms, NULL, store, NULL, out, flags) == 0) {
|
||||
unsigned long err = ERR_peek_last_error();
|
||||
switch(ERR_GET_REASON(err)) {
|
||||
+ case EVP_R_INVALID_DIGEST:
|
||||
case RSA_R_DIGEST_NOT_ALLOWED:
|
||||
case CMS_R_UNKNOWN_DIGEST_ALGORITHM:
|
||||
case CMS_R_NO_MATCHING_DIGEST:
|
||||
--
|
||||
2.38.1
|
||||
|
@ -34,7 +34,7 @@
|
||||
#
|
||||
# baserelease is what we have standardized across Fedora and what
|
||||
# rpmdev-bumpspec knows how to handle.
|
||||
%global baserelease 0.1
|
||||
%global baserelease 0.2
|
||||
|
||||
# This should be e.g. beta1 or %%nil
|
||||
%global pre_release %nil
|
||||
@ -91,6 +91,8 @@ Patch6: 0006-downstream-Allow-krad-UDP-TCP-localhost-connection-w.patch
|
||||
Patch7: 0007-Add-configure-variable-for-default-PKCS-11-module.patch
|
||||
Patch8: 0008-Set-reasonable-supportedCMSTypes-in-PKINIT.patch
|
||||
Patch9: 0009-Simplify-plugin-loading-code.patch
|
||||
Patch10: 0010-Update-error-checking-for-OpenSSL-CMS_verify.patch
|
||||
Patch11: 0011-downstream-Catch-SHA-1-digest-disallowed-error-for-P.patch
|
||||
|
||||
License: MIT
|
||||
URL: https://web.mit.edu/kerberos/www/
|
||||
@ -664,12 +666,14 @@ exit 0
|
||||
%{_libdir}/libkadm5srv_mit.so.*
|
||||
|
||||
%changelog
|
||||
* Tue Nov 22 2022 Julien Rische <jrische@redhat.com> - 1.20.1-0.1
|
||||
* Wed Nov 23 2022 Julien Rische <jrische@redhat.com> - 1.20.1-0.2
|
||||
- New upstream version (1.20.1)
|
||||
- Resolves: rhbz#2124463
|
||||
- Restore "supportedCMSTypes" attribute in PKINIT preauth requests
|
||||
- Set SHA-512 or SHA-256 with RSA as preferred CMS signature algorithms
|
||||
- Resolves: rhbz#2114766
|
||||
- Update error checking for OpenSSL CMS_verify
|
||||
- Resolves: rhbz#2119704
|
||||
|
||||
* Wed Nov 09 2022 Julien Rische <jrische@redhat.com> - 1.19.2-13
|
||||
- Fix integer overflows in PAC parsing (CVE-2022-42898)
|
||||
|
Loading…
Reference in New Issue
Block a user