Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1127505 - (CVE-2014-3512) CVE-2014-3512 openssl: SRP buffer overrun
CVE-2014-3512 openssl: SRP buffer overrun
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140806,repor...
: Security
Depends On:
Blocks: 1127468 1127506
  Show dependency treegraph
 
Reported: 2014-08-06 22:14 EDT by Andrew Griffiths
Modified: 2016-04-26 13:02 EDT (History)
62 users (show)

See Also:
Fixed In Version: openssl 1.0.1i
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-08-07 02:01:29 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrew Griffiths 2014-08-06 22:14:37 EDT
It was found that OpenSSL applications set up for SRP could have an internal buffer overrun if a malicious server or client sent invalid SRP parameters.
Comment 1 Arun Babu Neelicattu 2014-08-07 01:52:57 EDT
External References:

https://www.openssl.org/news/secadv_20140806.txt
Comment 3 Tomas Hoger 2014-08-07 02:01:29 EDT
The openssl packages shipped in Red Hat Enterprise Linux and Fedora are build with the Secure Remote Password (SRP) support disabled and were therefore not affected by this issue.

Upstream commit:
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4a23b12a031860253b58d503f296377ca076427b
Comment 5 Tomas Hoger 2014-08-07 02:31:01 EDT
Note that SRP support was introduced upstream in version 1.0.1.

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=edc032b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0deea0e
Comment 6 David Jorm 2014-08-07 02:37:46 EDT
Statement:

Not vulnerable. This issue did not affect the versions of openssl as shipped
with Red Hat Enterprise Linux 5, 6 and 7, Red Hat Enterprise Virtualization 3,
and Red Hat Enterprise Storage 2, as they do not enable Secure Remote Password
(SRP) support. All other supported Red Hat products that include openssl use
older versions that are not affected by this issue.

Note You need to log in before you can comment on or make changes to this bug.