Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 1337155

Summary: CVE-2016-2106 openssl: EVP_EncryptUpdate overflow [jbews-2.1.0]
Product: [JBoss] JBoss Enterprise Web Server 2 Reporter: Timothy Walsh <twalsh>
Component: opensslAssignee: George Zaronikas <gzaronik>
Status: CLOSED ERRATA QA Contact: Michal Karm Babacek <mbabacek>
Severity: medium Docs Contact:
Priority: medium    
Version: 2.1.0CC: csutherl, dknox, jclere, jdoyle, lgao, mbabacek, myarboro, rhatlapa, twalsh, weli
Target Milestone: DR03Keywords: Security, SecurityTracking
Target Release: 2.1.1   
Hardware: All   
OS: Linux   
Whiteboard: component:openssl
Fixed In Version: Doc Type: Release Note
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-08-22 18:10:03 UTC Type: Support Patch
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1331536    

Description Timothy Walsh 2016-05-18 12:03:45 UTC
jbews-2.1.0 tracking bug for openssl: see blocks bug list for full details of the security issue(s).

This bug is never intended to be made public, please put any public notes
in the blocked bugs.

[bug automatically created by: add-tracking-bugs]

Comment 3 errata-xmlrpc 2016-08-22 18:10:03 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2016-1650.html