First published: Mon Jun 02 2014(Updated: )
As per the upstream advisory: A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected. OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. Acknowledgements: Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Jüri Aedla as the original reporter of this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <0.9.8 | 0.9.8 |
OpenSSL OpenSSL | >=0.9.8<0.9.8za | |
OpenSSL OpenSSL | >=1.0.0<1.0.0m | |
OpenSSL OpenSSL | >=1.0.1<1.0.1h | |
Mariadb Mariadb | >=10.0.0<10.0.13 | |
openSUSE Leap | =42.1 | |
openSUSE openSUSE | =13.2 | |
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 |
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1632ef744872edc2aa2a53d487d3e79c965a4ad3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.