Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1202345 - (CVE-2015-0290) CVE-2015-0290 openssl: multiblock corrupted pointer
CVE-2015-0290 openssl: multiblock corrupted pointer
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20150319,reported=2...
: Security
Depends On:
Blocks: 1202442
  Show dependency treegraph
 
Reported: 2015-03-16 08:53 EDT by Martin Prpič
Modified: 2015-07-14 10:18 EDT (History)
47 users (show)

See Also:
Fixed In Version: openssl 1.0.2a
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-03-17 23:43:00 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Martin Prpič 2015-03-16 08:53:35 EDT
OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This feature only applies on 64-bit x86 architecture platforms that support AES NI instructions. A defect in the implementation of "multiblock" can cause OpenSSL's internal write buffer to become incorrectly set to NULL when using non-blocking I/O. Typically, when the user application is using a socket BIO for writing, this will only result in a failed connection. However if some other BIO is used, then it is likely that a segmentation fault will be triggered, thus enabling a potential denial of service attack.

This issue affects OpenSSL version 1.0.2, and is fixed in version 1.0.2a.

Acknowledgements:

Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Daniel Danner and Rainer Mueller as the original reporters.
Comment 1 Huzaifa S. Sidhpurwala 2015-03-17 23:43:00 EDT
Statement:

This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 5, 6, and 7.
Comment 2 Tomas Hoger 2015-03-18 10:05:34 EDT
Affected code was introduced upstream in 1.0.2 via:

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=95783193

Note You need to log in before you can comment on or make changes to this bug.