Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1227574 - (CVE-2015-3216) CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression
CVE-2015-3216 openssl: Crash in ssleay_rand_bytes due to locking regression
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20150528,reported=2...
: Security
: 1226204 1227734 (view as bug list)
Depends On: 1226204 1226209 1227734 1228618 1228619 1231051 1258884
Blocks: 717789 1227577 1395463
  Show dependency treegraph
 
Reported: 2015-06-03 00:11 EDT by Huzaifa S. Sidhpurwala
Modified: 2017-01-19 01:55 EST (History)
28 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A regression was found in the ssleay_rand_bytes() function in the versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7. This regression could cause a multi-threaded application to crash.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-06-15 21:33:03 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1115 normal SHIPPED_LIVE Moderate: openssl security update 2015-06-15 20:48:46 EDT
Red Hat Product Errata RHSA-2016:2957 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release 2016-12-15 22:11:19 EST

  None (edit)
Description Huzaifa S. Sidhpurwala 2015-06-03 00:11:16 EDT
A regression was found in the openssl packages shipped with Red Hat Enterprise Linux 6 and 7, leading to a denial-of-service when openssl is used with multi-threaded applications. 

More details about this issue is available at:

https://bugzilla.redhat.com/show_bug.cgi?id=1226204
Comment 1 Huzaifa S. Sidhpurwala 2015-06-03 22:26:10 EDT
(In reply to Huzaifa S. Sidhpurwala from comment #0)
 
> More details about this issue is available at:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=1226204

Note: Since the above bug is closed, more information about this flaw is available in the following bug:

https://bugzilla.redhat.com/show_bug.cgi?id=1225994
Comment 3 Huzaifa S. Sidhpurwala 2015-06-12 01:45:28 EDT
Created openssl tracking bugs for this issue:

Affects: fedora-all [bug 1231051]
Comment 4 Tomas Mraz 2015-06-15 09:07:23 EDT
*** Bug 1227734 has been marked as a duplicate of this bug. ***
Comment 5 Tomas Mraz 2015-06-15 09:15:17 EDT
*** Bug 1226204 has been marked as a duplicate of this bug. ***
Comment 6 errata-xmlrpc 2015-06-15 16:49:11 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2015:1115 https://rhn.redhat.com/errata/RHSA-2015-1115.html
Comment 7 Huzaifa S. Sidhpurwala 2015-06-15 21:33:03 EDT
Statement:

This issue does not affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.
Comment 10 errata-xmlrpc 2016-12-15 17:14:20 EST
This issue has been addressed in the following products:



Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html

Note You need to log in before you can comment on or make changes to this bug.