Bug 1127505 (CVE-2014-3512)
Summary: | CVE-2014-3512 openssl: SRP buffer overrun | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrew Griffiths <agriffit> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aavati, abaron, acathrow, alonbl, aneelica, aortega, apevec, ayoung, bazulay, bmcclain, bressers, cdewolf, cfergeau, chrisw, dallan, dandread, darran.lofthouse, dblechte, dgregor, djorm, dknox, ecohen, erik-fedora, fdeutsch, fnasser, gkotton, huwang, idith, iheim, jason.greene, jawilson, jclere, jdoyle, jgreguske, jrusnack, ktietz, lfarkas, lgao, lhh, lpeer, markmc, myarboro, nlevinki, pgier, pslavice, pstehlik, rbryant, rfortier, rhs-bugs, rh-spice-bugs, rjones, rsvoboda, sclewis, smohan, ssaha, tmraz, vbellur, vtunka, weli, ycui, yeylon |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openssl 1.0.1i | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-08-07 06:01:29 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1127468, 1127506 |
Description
Andrew Griffiths
2014-08-07 02:14:37 UTC
External References: https://www.openssl.org/news/secadv_20140806.txt The openssl packages shipped in Red Hat Enterprise Linux and Fedora are build with the Secure Remote Password (SRP) support disabled and were therefore not affected by this issue. Upstream commit: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4a23b12a031860253b58d503f296377ca076427b Note that SRP support was introduced upstream in version 1.0.1. https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=edc032b https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0deea0e Statement: Not vulnerable. This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 5, 6 and 7, Red Hat Enterprise Virtualization 3, and Red Hat Enterprise Storage 2, as they do not enable Secure Remote Password (SRP) support. All other supported Red Hat products that include openssl use older versions that are not affected by this issue. |