Bug 1228603 (CVE-2015-1789)
Summary: | CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | cdewolf, csutherl, dandread, darran.lofthouse, dknox, jason.greene, jawilson, jclere, jdoyle, lgao, mbabacek, myarboro, pgier, pslavice, rsvoboda, security-response-team, szidek, tmraz, twalsh, vtunka, weli | ||||
Target Milestone: | --- | Keywords: | Reopened, Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: |
An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL, which is used to test the expiry dates of SSL/TLS certificates. An attacker could possibly use a specially crafted SSL/TLS certificate or CRL (Certificate Revocation List), which when parsed by an application would cause that application to crash.
|
Story Points: | --- | ||||
Clone Of: | Environment: | ||||||
Last Closed: | 2019-06-08 02:41:37 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1228618, 1228619, 1228620, 1228621, 1231051, 1234214 | ||||||
Bug Blocks: | 1227577 | ||||||
Attachments: |
|
Description
Huzaifa S. Sidhpurwala
2015-06-05 10:12:10 UTC
Created attachment 1035151 [details] Proposed patch for CVE-2015-1789 Public via: https://www.openssl.org/news/secadv_20150611.txt Upstream commits: OpenSSL-1.0.1: https://github.com/openssl/openssl/commit/370ac320301e28bb615cee80124c042649c95d14 OpenSSL-0.9.8: https://github.com/openssl/openssl/commit/fa57f74a3941db6b2efb2f43c6add914ec83db20 Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1231051] A blog post related to this issue from Hanno Böck, one of the original reporters: https://blog.fuzzing-project.org/15-Out-of-bounds-read-in-OpenSSL-function-X509_cmp_time-CVE-2015-1789-and-other-minor-issues.html It also provides a test case for this issue: https://crashes.fuzzing-project.org/openssl-verify-oob.crt This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 6 Via RHSA-2015:1115 https://rhn.redhat.com/errata/RHSA-2015-1115.html Statement: (none) openssl-1.0.1k-10.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. openssl-1.0.1k-10.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2015:1197 https://rhn.redhat.com/errata/RHSA-2015-1197.html |