Back to bug 1311876
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Huzaifa S. Sidhpurwala | 2016-02-25 09:15:48 UTC | CC | security-response-team | |
| Red Hat Bugzilla | 2016-02-25 09:15:48 UTC | Doc Type | --- | Bug Fix |
| Huzaifa S. Sidhpurwala | 2016-02-25 09:15:54 UTC | Blocks | 1301847 | |
| Huzaifa S. Sidhpurwala | 2016-02-25 09:22:23 UTC | Status | NEW | CLOSED |
| Resolution | --- | NOTABUG | ||
| Last Closed | 2016-02-25 04:22:23 UTC | |||
| Martin Prpič | 2016-02-29 12:03:52 UTC | Whiteboard | impact=low,public=no,reported=20160225,source=upstream,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/openssl=notaffected,rhel-6/openssl=notaffected,rhel-7/openssl=notaffected,fedora-all/openssl=notaffected | impact=low,public=20160226,reported=20160225,source=upstream,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/openssl=notaffected,rhel-6/openssl=notaffected,rhel-7/openssl=notaffected,fedora-all/openssl=notaffected |
| Martin Prpič | 2016-02-29 12:03:57 UTC | Summary | EMBARGOED CVE-2016-0798 OpenSSL: Avoid memory leak in SRP | CVE-2016-0798 OpenSSL: Avoid memory leak in SRP |
| Martin Prpič | 2016-02-29 12:04:00 UTC | Group | security, qe_staff | |
| Martin Prpič | 2016-02-29 12:13:51 UTC | Whiteboard | impact=low,public=20160226,reported=20160225,source=upstream,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/openssl=notaffected,rhel-6/openssl=notaffected,rhel-7/openssl=notaffected,fedora-all/openssl=notaffected | impact=low,public=20160225,reported=20160225,source=upstream,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/openssl=notaffected,rhel-6/openssl=notaffected,rhel-7/openssl=notaffected,fedora-all/openssl=notaffected |
| Martin Prpič | 2016-02-29 12:43:39 UTC | Doc Text | A memory leak flaw was found in the way OpenSSL performed SRP user database look-ups using the SRP_VBASE_get_by_user() function. A remote attacker connecting to certain SRP servers with an invalid user name could leak approximately 300 bytes of the server's memory per connection. | |
| Martin Prpič | 2016-02-29 12:46:01 UTC | Whiteboard | impact=low,public=20160225,reported=20160225,source=upstream,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/openssl=notaffected,rhel-6/openssl=notaffected,rhel-7/openssl=notaffected,fedora-all/openssl=notaffected | impact=low,public=20160225,reported=20160225,source=upstream,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/openssl=notaffected,rhel-6/openssl=notaffected,rhel-7/openssl=notaffected,fedora-all/openssl=notaffected,fedora-all/mingw-openssl=notaffected,rhel-5/openssl097a=notaffected,rhel-6/openssl098e=notaffected,rhel-7/openssl098e=notaffected,epel-5/openssl101e=notaffected,rhev-m-3/rhev-hypervisor=notaffected,jbews-2/openssl=notaffected,jbews-3/openssl=notaffected |
| Martin Prpič | 2016-02-29 12:46:20 UTC | CC | alonbl, bmcclain, csutherl, dblechte, dknox, erik-fedora, fdeutsch, gklein, jclere, jdoyle, ktietz, lgao, lsurette, marcandre.lureau, mbabacek, mgoldboi, michal.skrivanek, myarboro, pstehlik, redhat-bugzilla, rjones, sherold, tmraz, twalsh, weli, ycui, ydary, yeylon, ykaul | |
| Norman Sardella | 2016-03-01 15:29:45 UTC | CC | sardella | |
| Product Security DevOps Team | 2019-09-29 13:45:06 UTC | Whiteboard | impact=low,public=20160225,reported=20160225,source=upstream,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/openssl=notaffected,rhel-6/openssl=notaffected,rhel-7/openssl=notaffected,fedora-all/openssl=notaffected,fedora-all/mingw-openssl=notaffected,rhel-5/openssl097a=notaffected,rhel-6/openssl098e=notaffected,rhel-7/openssl098e=notaffected,epel-5/openssl101e=notaffected,rhev-m-3/rhev-hypervisor=notaffected,jbews-2/openssl=notaffected,jbews-3/openssl=notaffected |
Back to bug 1311876