Bug 1314757 (CVE-2016-2842)
Summary: | CVE-2016-2842 openssl: doapr_outch function does not verify that certain memory allocation succeeds | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bbaranow, bmaxwell, cdewolf, csutherl, dandread, darran.lofthouse, dknox, dosoudil, erik-fedora, gzaronik, huzaifas, jason.greene, jawilson, jboss-set, jclere, jdoyle, ktietz, lgao, marcandre.lureau, mbabacek, mturk, myarboro, petercho, pgier, psakar, pslavice, psotirop, redhat-bugzilla, rjones, rnetuka, rsvoboda, sardella, security-response-team, slawomir, slukasik, tmraz, twalsh, vtunka, weli, ykawada, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: | https://issues.redhat.com/browse/JBCS-93 | ||
Whiteboard: | |||
Fixed In Version: | openssl 1.0.1s, openssl 1.0.2g | Doc Type: | Bug Fix |
Doc Text: |
Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 02:49:23 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1312856, 1312857, 1312858, 1314764, 1314765, 1314766, 1321841, 1321842, 1331569, 1331865, 1331866, 1366994 | ||
Bug Blocks: | 1314768, 1395463 |
Description
Adam Mariš
2016-03-04 12:15:42 UTC
Created openssl101e tracking bugs for this issue: Affects: epel-5 [bug 1314766] Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1314764] Created mingw-openssl tracking bugs for this issue: Affects: fedora-all [bug 1314765] Can we do this in higher priority? Clients concern this seriously as it is related to openssl. Thanks. Note that the patch for CVE-2016-0799 fixes also this issue. Acknowledgments: Name: the OpenSSL project Upstream: Guido Vranken This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0722 https://rhn.redhat.com/errata/RHSA-2016-0722.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0996 https://rhn.redhat.com/errata/RHSA-2016-0996.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6.7 Extended Update Support Via RHSA-2016:2073 https://rhn.redhat.com/errata/RHSA-2016-2073.html This issue has been addressed in the following products: Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html |