Bug 1203232 (CVE-2009-5146)

Summary: CVE-2009-5146 openssl: memory leak in hostname TLS extension
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: unspecifiedCC: aavati, acathrow, alonbl, asoldano, bazulay, bbaranow, bmaxwell, bmcclain, brian.stansberry, cdewolf, cfergeau, csutherl, dandread, darran.lofthouse, dblechte, dknox, dkreling, dosoudil, ecohen, erik-fedora, fjuma, gklein, gzaronik, idith, iheim, istudens, ivassile, iweiss, jason.greene, jawilson, jclere, jdoyle, jrusnack, kkhan, ktietz, lfarkas, lgao, lsurette, marcandre.lureau, michal.skrivanek, mosmerov, mperina, msochure, msvehla, myarboro, nlevinki, nwallace, pesilva, pgier, pjindal, plodge, pmackay, pslavice, rbalakri, rfortier, rhel-crypto-maint, rhs-bugs, rh-spice-bugs, rjones, rstancel, rsvoboda, sbonazzo, smaestri, smohan, srevivo, ssaha, szappis, tburke, tmraz, tom.jenkinson, twalsh, vbellur, vtunka, weli, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: openssl 0.9.8k Doc Type: Bug Fix
Doc Text:
[REJECTED CVE] A memory leak flaw was fix in the hostname TLS extension. This flaw was introduced with the backport of the TLS extension code first introduced in version 0.9.8k of openssl.
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-03-18 12:35:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Martin Prpič 2015-03-18 12:34:07 UTC
A memory leak flaw was fix in the hostname TLS extension:

https://github.com/openssl/openssl/commit/7587347bc48e7e8a1e800e48bb0a658f1557c424

This flaw was introduced with the backport of the TLS extension code first introduced in version 0.9.8k of openssl.

Additional information:

http://seclists.org/oss-sec/2015/q1/856

Comment 1 Martin Prpič 2015-03-18 12:34:52 UTC
Statement:

This issue did not affect any versions of OpenSSL as shipped with Red Hat Enterprise Linux 5, 6, and 7.