Bug 1930294 (CVE-2021-23839)
Summary: | CVE-2021-23839 openssl: incorrect SSLv2 rollback protection | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | aboyko, asoldano, atangrin, bbaranow, bmaxwell, brian.stansberry, cdewolf, cfergeau, chazlett, crypto-team, csutherl, darran.lofthouse, dkreling, dmoppert, dosoudil, eleandro, elima, erik-fedora, fidencio, gghezzo, gparvin, gwync, gzaronik, huzaifas, iweiss, jclere, jochrist, jperkins, jramanat, jweiser, jwon, kaycoth, krathod, ktietz, kwills, kyoneyam, lgao, marcandre.lureau, msochure, msvehla, mturk, nwallace, pjindal, pmackay, redhat-bugzilla, rguimara, rh-spice-bugs, rjones, rstancel, rsvoboda, sahana, smaestri, stcannon, szappis, thee, tm, tom.jenkinson, yborgess, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openssl 1.1.1j, openssl 1.0.2y | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in openssl. OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-08-06 01:07:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1930314, 1930316, 1930317, 1930318, 1936459 | ||
Bug Blocks: | 1930329 |
Description
Guilherme de Almeida Suckevicz
2021-02-18 16:37:21 UTC
Created compat-openssl10 tracking bugs for this issue: Affects: fedora-all [bug 1930318] Created mingw-openssl tracking bugs for this issue: Affects: fedora-all [bug 1930317] Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1930314] Created openssl11 tracking bugs for this issue: Affects: epel-7 [bug 1930316] Statement: Versions of OpenSSL packages shipped with Red Hat Enterprise Linux 7.4 and later do not support SSLv2 and therefore are not affected by this flaw. This vulnerability is out of security support scope for the following product: * Red Hat JBoss Enterprise Application Platform 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details. This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7 Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8 Via RHSA-2021:3016 https://access.redhat.com/errata/RHSA-2021:3016 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-23839 |