First published: Fri Jan 06 2012(Updated: )
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | =0.9.8 | |
OpenSSL OpenSSL | =0.9.8a | |
OpenSSL OpenSSL | =0.9.8b | |
OpenSSL OpenSSL | =0.9.8c | |
OpenSSL OpenSSL | =0.9.8d | |
OpenSSL OpenSSL | =0.9.8e | |
OpenSSL OpenSSL | =0.9.8f | |
OpenSSL OpenSSL | =0.9.8g | |
OpenSSL OpenSSL | =0.9.8h | |
OpenSSL OpenSSL | =0.9.8i | |
OpenSSL OpenSSL | =0.9.8j | |
OpenSSL OpenSSL | =0.9.8k | |
OpenSSL OpenSSL | =0.9.8l | |
OpenSSL OpenSSL | =0.9.8m | |
OpenSSL OpenSSL | =0.9.8n | |
OpenSSL OpenSSL | =0.9.8o | |
OpenSSL OpenSSL | =0.9.8p | |
OpenSSL OpenSSL | =0.9.8q | |
OpenSSL OpenSSL | =0.9.8r |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.