Back to bug 2164492

Who When What Removed Added
Marian Rehak 2023-01-25 15:33:37 UTC CC security-response-team
Sandipan Roy 2023-01-25 18:07:04 UTC Depends On 2164556, 2164565, 2164562, 2164561, 2164558, 2164563, 2164557, 2164564, 2164559
Sandipan Roy 2023-01-25 18:10:15 UTC Depends On 2164568, 2164569, 2164567, 2164566
Sandipan Roy 2023-01-25 19:06:51 UTC Deadline 2023-02-07
TEJ RATHI 2023-01-27 08:59:41 UTC CC acrosby, adudiak, bdettelb, caswilli, dffrench, dfreiber, dhalasz, dkuc, drieden, fjansen, gzaronik, hbraun, hkataria, ikanias, jary, jburrell, jkoehler, jmitchel, jtanner, jwong, kaycoth, kshier, micjohns, ngough, nweather, rgodfrey, rogbas, rravi, stcannon, sthirugn, tfister, tohughes, vkrizan, vkumar, vmugicag, yguenane
Sandipan Roy 2023-02-01 14:39:00 UTC CC jwong
Depends On 2166347
Sandipan Roy 2023-02-07 09:12:56 UTC Doc Text A use-after-free vulnerability was found in OpenSSL's BIO_new_NDEF function. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash.
RaTasha Tillery-Smith 2023-02-07 13:46:14 UTC Doc Text A use-after-free vulnerability was found in OpenSSL's BIO_new_NDEF function. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. A use-after-free vulnerability was found in OpenSSL's BIO_new_NDEF function. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally by OpenSSL to support the SMIME, CMS, and PKCS7 streaming capabilities, but it may also be called directly by end-user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions. For example, if a CMS recipient public key is invalid, the new filter BIO is freed, and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up, and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then calls BIO_pop() on the BIO, a use-after-free will occur, possibly resulting in a crash.
Zack Miele 2023-02-07 17:00:45 UTC Group security, qe_staff
Summary EMBARGOED CVE-2023-0215 openssl: use-after-free following BIO_new_NDEF CVE-2023-0215 openssl: use-after-free following BIO_new_NDEF
CC bootloader-eng-team, rh-spice-bugs, virt-maint
Deadline 2023-02-07
Zack Miele 2023-02-07 17:55:40 UTC Depends On 2167894, 2167890, 2167898, 2167896, 2167895, 2167893, 2167900, 2167901, 2167897, 2167899, 2167891, 2167902, 2167892, 2167889, 2167887, 2167888
Shreyas Mahangade 2023-02-20 03:32:33 UTC CC smahanga
errata-xmlrpc 2023-02-28 08:18:13 UTC Link ID Red Hat Product Errata RHSA-2023:0946
Christopher Voltz 2023-03-10 16:14:17 UTC CC christopher.voltz
errata-xmlrpc 2023-03-14 13:52:59 UTC Link ID Red Hat Product Errata RHSA-2023:1199
errata-xmlrpc 2023-03-22 10:33:39 UTC Link ID Red Hat Product Errata RHSA-2023:1405
Product Security DevOps Team 2023-03-22 14:04:59 UTC Resolution --- ERRATA
Status NEW CLOSED
Last Closed 2023-03-22 14:04:59 UTC
errata-xmlrpc 2023-03-22 19:48:37 UTC Link ID Red Hat Product Errata RHBA-2023:1413
errata-xmlrpc 2023-03-22 19:48:45 UTC Link ID Red Hat Product Errata RHBA-2023:1414
errata-xmlrpc 2023-03-22 19:54:58 UTC Link ID Red Hat Product Errata RHBA-2023:1415
errata-xmlrpc 2023-03-22 20:44:57 UTC Link ID Red Hat Product Errata RHBA-2023:1417
errata-xmlrpc 2023-03-22 20:48:30 UTC Link ID Red Hat Product Errata RHBA-2023:1416
errata-xmlrpc 2023-03-22 20:56:36 UTC Link ID Red Hat Product Errata RHBA-2023:1418
errata-xmlrpc 2023-03-22 21:00:55 UTC Link ID Red Hat Product Errata RHBA-2023:1419
errata-xmlrpc 2023-03-22 21:25:33 UTC Link ID Red Hat Product Errata RHBA-2023:1420
errata-xmlrpc 2023-03-22 21:26:43 UTC Link ID Red Hat Product Errata RHBA-2023:1421
errata-xmlrpc 2023-03-22 21:34:45 UTC Link ID Red Hat Product Errata RHBA-2023:1422
errata-xmlrpc 2023-03-22 21:37:32 UTC Link ID Red Hat Product Errata RHBA-2023:1423
errata-xmlrpc 2023-03-22 21:38:48 UTC Link ID Red Hat Product Errata RHBA-2023:1425
errata-xmlrpc 2023-03-22 21:42:57 UTC Link ID Red Hat Product Errata RHBA-2023:1424
errata-xmlrpc 2023-03-22 21:47:27 UTC Link ID Red Hat Product Errata RHBA-2023:1426
errata-xmlrpc 2023-03-23 08:53:27 UTC Link ID Red Hat Product Errata RHBA-2023:1431
errata-xmlrpc 2023-03-23 13:05:06 UTC Link ID Red Hat Product Errata RHBA-2023:1446
errata-xmlrpc 2023-03-23 17:48:01 UTC Link ID Red Hat Product Errata RHBA-2023:1449
errata-xmlrpc 2023-03-27 01:23:06 UTC Link ID Red Hat Product Errata RHBA-2023:1459
Kazu Yoshida 2023-03-27 03:46:48 UTC CC kyoshida
errata-xmlrpc 2023-03-27 06:59:00 UTC Link ID Red Hat Product Errata RHBA-2023:1460
errata-xmlrpc 2023-03-27 07:48:52 UTC Link ID Red Hat Product Errata RHBA-2023:1463
errata-xmlrpc 2023-03-27 08:02:50 UTC Link ID Red Hat Product Errata RHBA-2023:1465
errata-xmlrpc 2023-03-27 08:50:22 UTC Link ID Red Hat Product Errata RHBA-2023:1461
errata-xmlrpc 2023-03-27 10:35:12 UTC Link ID Red Hat Product Errata RHBA-2023:1464
errata-xmlrpc 2023-03-27 10:36:07 UTC Link ID Red Hat Product Errata RHBA-2023:1475
errata-xmlrpc 2023-03-27 10:54:13 UTC Link ID Red Hat Product Errata RHBA-2023:1477
errata-xmlrpc 2023-03-27 11:23:54 UTC Link ID Red Hat Product Errata RHBA-2023:1476
errata-xmlrpc 2023-03-28 11:36:19 UTC Link ID Red Hat Product Errata RHBA-2023:1493
errata-xmlrpc 2023-03-28 14:02:03 UTC Link ID Red Hat Product Errata RHBA-2023:1497
errata-xmlrpc 2023-03-28 17:57:58 UTC Link ID Red Hat Product Errata RHBA-2023:1499
errata-xmlrpc 2023-03-28 19:04:49 UTC Link ID Red Hat Product Errata RHBA-2023:1500
errata-xmlrpc 2023-03-28 21:16:07 UTC Link ID Red Hat Product Errata RHBA-2023:1502
errata-xmlrpc 2023-03-29 12:45:51 UTC Link ID Red Hat Product Errata RHBA-2023:1520
errata-xmlrpc 2023-03-29 12:49:55 UTC Link ID Red Hat Product Errata RHBA-2023:1519
errata-xmlrpc 2023-03-29 12:59:21 UTC Link ID Red Hat Product Errata RHBA-2023:1517
errata-xmlrpc 2023-03-30 09:59:22 UTC Link ID Red Hat Product Errata RHBA-2023:1530
errata-xmlrpc 2023-03-30 12:21:28 UTC Link ID Red Hat Product Errata RHBA-2023:1532
errata-xmlrpc 2023-03-30 15:39:58 UTC Link ID Red Hat Product Errata RHBA-2023:1536
errata-xmlrpc 2023-03-30 19:40:01 UTC Link ID Red Hat Product Errata RHBA-2023:1539
errata-xmlrpc 2023-04-04 14:23:36 UTC Link ID Red Hat Product Errata RHBA-2023:1625
errata-xmlrpc 2023-04-04 15:41:51 UTC Link ID Red Hat Product Errata RHBA-2023:1626
errata-xmlrpc 2023-04-04 16:42:16 UTC Link ID Red Hat Product Errata RHBA-2023:1628
errata-xmlrpc 2023-04-04 16:48:19 UTC Link ID Red Hat Product Errata RHBA-2023:1627
errata-xmlrpc 2023-04-05 02:58:37 UTC Link ID Red Hat Product Errata RHBA-2023:1641
errata-xmlrpc 2023-04-05 12:31:04 UTC Link ID Red Hat Product Errata RHBA-2023:1654
errata-xmlrpc 2023-04-11 14:49:51 UTC Link ID Red Hat Product Errata RHBA-2023:1708
errata-xmlrpc 2023-04-11 21:35:16 UTC Link ID Red Hat Product Errata RHBA-2023:1736
errata-xmlrpc 2023-04-12 21:25:16 UTC Link ID Red Hat Product Errata RHBA-2023:1764
errata-xmlrpc 2023-04-17 01:50:48 UTC Link ID Red Hat Product Errata RHBA-2023:1798
errata-xmlrpc 2023-04-17 13:18:34 UTC Link ID Red Hat Product Errata RHBA-2023:1800
errata-xmlrpc 2023-04-18 16:52:53 UTC Link ID Red Hat Product Errata RHBA-2023:1825
errata-xmlrpc 2023-04-18 21:30:22 UTC Link ID Red Hat Product Errata RHBA-2023:1850
errata-xmlrpc 2023-04-19 19:40:47 UTC Link ID Red Hat Product Errata RHBA-2023:1886
errata-xmlrpc 2023-04-24 01:45:05 UTC Link ID Red Hat Product Errata RHBA-2023:1929
errata-xmlrpc 2023-04-26 18:29:09 UTC Link ID Red Hat Product Errata RHBA-2023:2033
errata-xmlrpc 2023-04-27 13:25:51 UTC Link ID Red Hat Product Errata RHBA-2023:2048
Nick Tait 2023-04-28 22:41:14 UTC Depends On 2191730
Nick Tait 2023-04-28 22:43:29 UTC Depends On 2191731
Nick Tait 2023-04-28 22:45:11 UTC Depends On 2191732
errata-xmlrpc 2023-05-02 18:14:58 UTC Link ID Red Hat Product Errata RHBA-2023:2086
errata-xmlrpc 2023-05-03 02:30:45 UTC Link ID Red Hat Product Errata RHBA-2023:2088
errata-xmlrpc 2023-05-03 22:06:02 UTC Link ID Red Hat Product Errata RHBA-2023:2105
errata-xmlrpc 2023-05-03 22:25:46 UTC Link ID Red Hat Product Errata RHBA-2023:2106
errata-xmlrpc 2023-05-09 07:13:21 UTC Link ID Red Hat Product Errata RHSA-2023:2165
errata-xmlrpc 2023-05-16 08:29:58 UTC Link ID Red Hat Product Errata RHSA-2023:2932
RHEL Program Management Team 2023-05-19 17:21:56 UTC Depends On 2208592
RHEL Program Management Team 2023-05-19 17:22:08 UTC Depends On 2208593
errata-xmlrpc 2023-05-31 18:36:55 UTC Link ID Red Hat Product Errata RHSA-2023:3408
errata-xmlrpc 2023-06-05 11:47:12 UTC Link ID Red Hat Product Errata RHSA-2023:3355
errata-xmlrpc 2023-06-05 11:51:02 UTC Link ID Red Hat Product Errata RHSA-2023:3354
errata-xmlrpc 2023-06-05 13:56:09 UTC Link ID Red Hat Product Errata RHSA-2023:3420
errata-xmlrpc 2023-06-05 14:16:40 UTC Link ID Red Hat Product Errata RHSA-2023:3421
errata-xmlrpc 2023-07-18 08:19:41 UTC Link ID Red Hat Product Errata RHSA-2023:4128

Back to bug 2164492