Bug 1152961 (CVE-2014-3567)
Summary: | CVE-2014-3567 openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abaron, acathrow, apevec, bmcclain, cdewolf, cfergeau, chrisw, dahjelle.redhat.com, dallan, dandread, darran.lofthouse, erik-fedora, fdeutsch, fnasser, gkotton, grocha, huwang, idith, jason.greene, jawilson, jclere, jdoyle, just4nick, lgao, lhh, lpeer, lsurette, marcandre.lureau, markmc, michal.skrivanek, mjc, mnewsome, myarboro, nlevinki, pslavice, pstehlik, rbryant, rfortier, rhs-bugs, rh-spice-bugs, rjones, rsvoboda, sardella, sclewis, security-response-team, srevivo, vtunka, weli, ycui, ykaul |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openssl 0.9.8zc, openssl 1.0.0o, openssl 1.0.1j | Doc Type: | Bug Fix |
Doc Text: |
A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-20 10:46:35 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1152854, 1152855, 1152856, 1152857, 1154551 | ||
Bug Blocks: | 1152790, 1155552 |
Description
Huzaifa S. Sidhpurwala
2014-10-15 09:35:43 UTC
Upstream patch: OpenSSL-1.0.1: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7fd4ce6a997be5f5c9e744ac527725c2850de203 OpenSSL-0.9.8: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2ed80d14d7159de7b52c7720128459e8c24a94d5 Statement: This issue does not affect the version of openssl shipped with Red Hat Enterprise Linux 5; Red Hat JBoss Enterprise Application Server 5 and 6; and Red Hat JBoss Enterprise Web Server 1 and 2 because openssl-0.9.8e does not include support for session tickets. IssueDescription: A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. Fixed upstream in OpenSSL versions 0.9.8zc, 1.0.0o and 1.0.1j: https://www.openssl.org/news/secadv_20141015.txt This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2014:1652 https://rhn.redhat.com/errata/RHSA-2014-1652.html This issue has been addressed in the following products: Red Hat Storage 2.1 Via RHSA-2014:1692 https://rhn.redhat.com/errata/RHSA-2014-1692.html This issue has been addressed in the following products: RHEV-H and Agents for RHEL-6 Via RHSA-2015:0126 https://rhn.redhat.com/errata/RHSA-2015-0126.html |