CVE Vulnerabilities

CVE-2023-0216

NULL Pointer Dereference

Published: Feb 08, 2023 | Modified: Nov 04, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions.

The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
OpensslOpenssl3.0.0 (including)3.0.7 (including)
Red Hat Enterprise Linux 9RedHatopenssl-1:3.0.1-47.el9_1*
Red Hat Enterprise Linux 9RedHatopenssl-1:3.0.1-47.el9_1*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatopenssl-1:3.0.1-46.el9_0*
Edk2Ubuntutrusty*
Edk2Ubuntuxenial*
NodejsUbuntutrusty*
OpensslUbuntudevel*
OpensslUbuntujammy*
OpensslUbuntukinetic*
OpensslUbuntulunar*
OpensslUbuntumantic*
OpensslUbuntutrusty*
OpensslUbuntuupstream*
OpensslUbuntuxenial*

Potential Mitigations

References