Bug 1202345 (CVE-2015-0290) - CVE-2015-0290 openssl: multiblock corrupted pointer
Summary: CVE-2015-0290 openssl: multiblock corrupted pointer
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2015-0290
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1202442
TreeView+ depends on / blocked
 
Reported: 2015-03-16 12:53 UTC by Martin Prpič
Modified: 2019-09-29 13:29 UTC (History)
47 users (show)

Fixed In Version: openssl 1.0.2a
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-03-18 03:43:00 UTC


Attachments (Terms of Use)

Description Martin Prpič 2015-03-16 12:53:35 UTC
OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This feature only applies on 64-bit x86 architecture platforms that support AES NI instructions. A defect in the implementation of "multiblock" can cause OpenSSL's internal write buffer to become incorrectly set to NULL when using non-blocking I/O. Typically, when the user application is using a socket BIO for writing, this will only result in a failed connection. However if some other BIO is used, then it is likely that a segmentation fault will be triggered, thus enabling a potential denial of service attack.

This issue affects OpenSSL version 1.0.2, and is fixed in version 1.0.2a.

Acknowledgements:

Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Daniel Danner and Rainer Mueller as the original reporters.

Comment 1 Huzaifa S. Sidhpurwala 2015-03-18 03:43:00 UTC
Statement:

This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 5, 6, and 7.

Comment 2 Tomas Hoger 2015-03-18 14:05:34 UTC
Affected code was introduced upstream in 1.0.2 via:

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=95783193


Note You need to log in before you can comment on or make changes to this bug.