Hide Forgot
The following was reported by OpenSSL upstream: If a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous ticket then a race condition can occur potentially leading to a double free of the ticket data. This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8. OpenSSL 1.0.2 users should upgrade to 1.0.2b OpenSSL 1.0.1 users should upgrade to 1.0.1n OpenSSL 1.0.0 users should upgrade to 1.0.0s OpenSSL 0.9.8 users should upgrade to 0.9.8zg This issue was discovered by Emilia Käsper of the OpenSSL development team. The fix was developed by Matt Caswell of the OpenSSL development team. Acknowledgements: Red Hat would like to thank the OpenSSL project for reporting this issue.
Created attachment 1035153 [details] Proposed patch for CVE-2015-1791
Upstream patch: https://github.com/openssl/openssl/commit/939b4960276b040fc0ed52232238fcc9e2e9ec21 https://github.com/openssl/openssl/commit/708cf593587e2fda67dae9782991ff9fccc781eb
Reference: https://www.openssl.org/news/secadv_20150611.txt
Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1231051]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 6 Via RHSA-2015:1115 https://rhn.redhat.com/errata/RHSA-2015-1115.html
Statement: This issue does NOT affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.
openssl-1.0.1k-10.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
openssl-1.0.1k-10.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.