Bug 1388051

Summary: 3des strength reduction patch malformed
Product: Red Hat Enterprise Linux 7 Reporter: Stefan Ring <stefanrin>
Component: opensslAssignee: Tomas Mraz <tmraz>
Status: CLOSED DUPLICATE QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: low Docs Contact:
Priority: low    
Version: 7.2CC: szidek
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-04-03 14:31:34 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Stefan Ring 2016-10-24 10:14:39 UTC
Description of problem:

The patch openssl-1.0.1e-3des-strength.patch has a superfluous empty line in line 32 which makes the patch program ignore the following hunk. The patch looks like it would set four numbers to 112, but it only changes three. I found out about this when I tried building the package on el5 because el5's patch program complains about this and does not silently throw the hunk away.

Version-Release number of selected component (if applicable):
1.0.1e-51.el7_2.7

How reproducible:
Looking at ssl/s2_lib.c, around line 250 (block named "DES_192_EDE3_CBC_WITH_MD5")

Steps to Reproduce:
1.
2.
3.

Actual results:
Compiled source code does not match the (presumed) expectations of the patch author

Expected results:
Patch and compiled source code agree


Additional info:

Comment 1 Tomas Mraz 2016-10-24 10:25:36 UTC
Thank you for the report. Fortunately only the SSLv2 3DES cipher suite is affected which is not used by default anyway as SSLv2 is disabled.

Comment 2 Tomas Mraz 2017-04-03 14:31:34 UTC

*** This bug has been marked as a duplicate of bug 1276310 ***