Bug 492304 (CVE-2009-0590)
Summary: | CVE-2009-0590 openssl: ASN1 printing crash | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Mark J. Cox <mjc> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | green, kreilly, nalin, ovirt-maint, rprice, tao, tmraz, vdanen, yamato |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0591 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-03-25 09:28:39 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 482112, 494578, 530522, 547448, 563125, 563127, 1127896 | ||
Bug Blocks: |
Comment 2
Mark J. Cox
2009-03-26 12:10:41 UTC
Upstream security advisory: http://openssl.org/news/secadv_20090325.txt The impact of this flaw is limited to crash of the applications calling affected openssl function. There are currently no known applications printing untrusted certificates, where application crash would be considered a security issue. Future opnessl packages updates may address this flaw. This issue may only affect applications using ASN1_STRING_print_ex() (or ASN1_STRING_print_ex_fp(), or ASN1_item_print() calling ASN1_STRING_print_ex()) OpenSSL function to print untrusted inputs (such as values from not verified X509 client certificates). No application shipped in Red Hat Enterprise Linux uses affected function. It is only used in sslinfo extension shipped with the recent versions of the PostgreSQL server (contrib module, not enabled by default; only included in postgresql-contrib packages in Red Hat Application Stack 2), where it is used to print information from the client certificate that was previously used to successfully authenticate user's connection (i.e. it has been issued by a trusted CA and hence certificate is trusted). Additional searches suggest that the function is rarely used by other open source projects not included in any Red Hat product. There's currently no plan to release an asynchronous security update to address this low-impact issue. Future OpenSSL packages updates may address this flaw. This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2009:1335 https://rhn.redhat.com/errata/RHSA-2009-1335.html This issue has been addressed in following products: Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 Via RHSA-2010:0163 https://rhn.redhat.com/errata/RHSA-2010-0163.html |