Bug 1311880 (CVE-2016-0797)
Summary: | CVE-2016-0797 OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | alonbl, bbaranow, bmaxwell, bmcclain, cdewolf, csutherl, dandread, darran.lofthouse, dblechte, dknox, dosoudil, fdeutsch, gzaronik, jawilson, jclere, jdoyle, jgreguske, lgao, lsurette, mbabacek, mgoldboi, michal.skrivanek, myarboro, omoris, pgier, psakar, pslavice, pstehlik, rnetuka, rsvoboda, sardella, security-response-team, slawomir, srevivo, tmraz, twalsh, vtunka, weli, ycui, ykaul |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openssl 1.0.1s, openssl 1.0.2g | Doc Type: | Bug Fix |
Doc Text: |
An integer overflow flaw, leading to a NULL pointer dereference or a heap-based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 02:48:50 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1301848, 1301849, 1301850, 1301851, 1301852, 1313535, 1313595, 1313598, 1331755 | ||
Bug Blocks: | 1301847, 1395463 |
Description
Huzaifa S. Sidhpurwala
2016-02-25 09:23:19 UTC
Acknowledgments: Name: the OpenSSL project Upstream: Guido Vranken Upstream commit: https://git.openssl.org/?p=openssl.git;a=commitdiff;h=99ba9fd02fd481eb971023a3a0a251a37eb87e4c External References: https://www.openssl.org/news/secadv/20160301.txt This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2016:0302 https://rhn.redhat.com/errata/RHSA-2016-0302.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2016:0301 https://rhn.redhat.com/errata/RHSA-2016-0301.html This issue has been addressed in the following products: RHEV-H and Agents for RHEL-6 RHEV-H and Agents for RHEL-7 Via RHSA-2016:0379 https://rhn.redhat.com/errata/RHSA-2016-0379.html openssl101e-1.0.1e-7.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html |