Bug 757909 (CVE-2011-4354)
| Summary: | CVE-2011-4354 openssl: ECC private leak (disclosure of TLS server's private key) | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | tmraz |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-11-29 21:21:11 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 758255 | ||
|
Description
Vincent Danen
2011-11-28 22:55:03 UTC
(In reply to comment #0) > A series of patches [2] fix this upstream (starting with r.1.15). > > [2] http://cvs.openssl.org/rlog?f=openssl%2Fcrypto%2Fbn%2Fbn_nist.c Related upstream bug report: http://rt.openssl.org/Ticket/Display.html?id=1593&user=guest&pass=guest which indicated last related revision is 1.20 / 1.21, i.e. mentioned series of patches should include following commits: http://cvs.openssl.org/chngview?cn=16985 http://cvs.openssl.org/chngview?cn=17029 http://cvs.openssl.org/chngview?cn=17030 http://cvs.openssl.org/chngview?cn=17077 http://cvs.openssl.org/chngview?cn=17078 http://cvs.openssl.org/chngview?cn=17081 http://cvs.openssl.org/chngview?cn=17085 Cumulative bn_nist.c patch: http://cvs.openssl.org/filediff?f=openssl/crypto/bn/bn_nist.c&v1=1.14&v2=1.21 Statement: This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3, 4, 5, or 6 as they did not include support for the ECDH or ECDHE ciphers. |