New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE output: rename IMPACT to SEVERITY; AFFECTED_RELEASE to FIXED_RELEASES; PACKAGE_STATE to FIX_STATES #33

Closed
ryran opened this Issue Nov 8, 2016 · 1 comment

Comments

Projects
None yet
1 participant
@ryran
Owner

ryran commented Nov 8, 2016

No description provided.

@ryran ryran added the enhancement label Nov 8, 2016

@ryran ryran self-assigned this Nov 8, 2016

ryran added a commit that referenced this issue Nov 8, 2016

@ryran

This comment has been minimized.

Show comment
Hide comment
@ryran

ryran Nov 8, 2016

Owner

Done!

$ rhsecapi CVE-2016-6302 -aw
Valid Red Hat CVE results retrieved: 1 of 1

CVE-2016-6302
  SEVERITY: Moderate Impact
  DATE:     2016-08-23
  IAVA:     2016-A-0262
  CWE:      CWE-190->CWE-125
  CVSS:     4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
  CVSS3:    5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
  BUGZILLA: 1369855
  DETAILS:  
   The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before
   1.1.0 does not consider the HMAC size during validation of the
   ticket length, which allows remote attackers to cause a denial of
   service via a ticket that is too short.  An integer underflow flaw
   leading to a buffer over-read was found in the way OpenSSL parsed
   TLS session tickets. A remote attacker could use this flaw to crash
   a TLS server using OpenSSL if it used SHA-512 as HMAC for session
   tickets.
  UPSTREAM_FIX:  openssl 1.0.1u, openssl 1.0.2i
  REFERENCES:
   https://www.openssl.org/news/secadv/20160922.txt
  FIXED_RELEASES:
   Red Hat Enterprise Linux 6 [openssl-1.0.1e-48.el6_8.3]: RHSA-2016:1940
   Red Hat Enterprise Linux 7 [openssl-1:1.0.1e-51.el7_2.7]: RHSA-2016:1940
  FIX_STATES:
   Affected: Red Hat JBoss Core Services 1 [openssl]
   Affected: Red Hat JBoss EAP 6 [openssl]
   Will not fix: Red Hat JBoss EWS 1 [openssl]
   Will not fix: Red Hat JBoss EWS 2 [openssl]
   Affected: Red Hat JBoss Web Server 3.0 [openssl]
   Not affected: Red Hat Enterprise Linux 5 [openssl097a]
   Not affected: Red Hat Enterprise Linux 5 [openssl]
   Not affected: Red Hat Enterprise Linux 6 [openssl098e]
   Not affected: Red Hat Enterprise Linux 7 [OVMF]
   Not affected: Red Hat Enterprise Linux 7 [openssl098e]
Owner

ryran commented Nov 8, 2016

Done!

$ rhsecapi CVE-2016-6302 -aw
Valid Red Hat CVE results retrieved: 1 of 1

CVE-2016-6302
  SEVERITY: Moderate Impact
  DATE:     2016-08-23
  IAVA:     2016-A-0262
  CWE:      CWE-190->CWE-125
  CVSS:     4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
  CVSS3:    5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
  BUGZILLA: 1369855
  DETAILS:  
   The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before
   1.1.0 does not consider the HMAC size during validation of the
   ticket length, which allows remote attackers to cause a denial of
   service via a ticket that is too short.  An integer underflow flaw
   leading to a buffer over-read was found in the way OpenSSL parsed
   TLS session tickets. A remote attacker could use this flaw to crash
   a TLS server using OpenSSL if it used SHA-512 as HMAC for session
   tickets.
  UPSTREAM_FIX:  openssl 1.0.1u, openssl 1.0.2i
  REFERENCES:
   https://www.openssl.org/news/secadv/20160922.txt
  FIXED_RELEASES:
   Red Hat Enterprise Linux 6 [openssl-1.0.1e-48.el6_8.3]: RHSA-2016:1940
   Red Hat Enterprise Linux 7 [openssl-1:1.0.1e-51.el7_2.7]: RHSA-2016:1940
  FIX_STATES:
   Affected: Red Hat JBoss Core Services 1 [openssl]
   Affected: Red Hat JBoss EAP 6 [openssl]
   Will not fix: Red Hat JBoss EWS 1 [openssl]
   Will not fix: Red Hat JBoss EWS 2 [openssl]
   Affected: Red Hat JBoss Web Server 3.0 [openssl]
   Not affected: Red Hat Enterprise Linux 5 [openssl097a]
   Not affected: Red Hat Enterprise Linux 5 [openssl]
   Not affected: Red Hat Enterprise Linux 6 [openssl098e]
   Not affected: Red Hat Enterprise Linux 7 [OVMF]
   Not affected: Red Hat Enterprise Linux 7 [openssl098e]

@ryran ryran closed this Nov 8, 2016

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment