Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1393930 - (CVE-2016-7053) CVE-2016-7053 openssl: CMS Null dereference vulnerability
CVE-2016-7053 openssl: CMS Null dereference vulnerability
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20161110,repor...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2016-11-10 11:18 EST by Adam Mariš
Modified: 2018-01-31 18:11 EST (History)
30 users (show)

See Also:
Fixed In Version: openssl 1.1.0c
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-11-10 11:21:43 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-11-10 11:18:21 EST
Quoting form the OpenSSL upstream advisory:

CMS Null dereference (CVE-2016-7053)
====================================

Severity: Moderate

Applications parsing invalid CMS structures can crash with a NULL pointer
dereference. This is caused by a bug in the handling of the ASN.1 CHOICE type
in OpenSSL 1.1.0 which can result in a NULL value being passed to the structure
callback if an attempt is made to free certain invalid encodings. Only CHOICE
structures using a callback which do not handle NULL value are affected.

OpenSSL 1.1.0 users should upgrade to 1.1.0c

This issue does not affect OpenSSL versions prior to 1.1.0

This issue was reported to OpenSSL on 12th October 2016 by Tyler Nighswander of
ForAllSecure. The fix was developed by Stephen Henson of the OpenSSL
development team.

External References:

https://www.openssl.org/news/secadv/20161110.txt
Comment 1 Adam Mariš 2016-11-10 11:18:45 EST
Acknowledgments:

Name: the OpenSSL project
Upstream: Tyler Nighswander (ForAllSecure)

Note You need to log in before you can comment on or make changes to this bug.