Hide Forgot
The following was reported by OpenSSL upstream: The PKCS#7 parsing code does not handle missing inner EncryptedContent correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing. Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected. This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg This issue was reported to OpenSSL on 18th April 2015 by Michal Zalewski (Google). The fix was developed by Emilia Käsper of the OpenSSL development team. Acknowledgements: Red Hat would like to thank the OpenSSL project for reporting this issue.
Created attachment 1035152 [details] Proposed patch for CVE-2015-1790
Public via: https://www.openssl.org/news/secadv_20150611.txt Upstream commits: OpenSSL-1.0.1: https://github.com/openssl/openssl/commit/5fbc59cac60db4d7c3172152b8bdafe0c675fabd OpenSSL-0.9.8: https://github.com/openssl/openssl/commit/582f1f41d49b5bf5ceaca241356d5f9c986f230f
Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1231051]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 6 Via RHSA-2015:1115 https://rhn.redhat.com/errata/RHSA-2015-1115.html
Statement: (none)
openssl-1.0.1k-10.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
openssl-1.0.1k-10.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2015:1197 https://rhn.redhat.com/errata/RHSA-2015-1197.html