First published: Fri May 02 2014(Updated: )
The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
OpenSSL OpenSSL | >=1.0.0<=1.0.1g | |
Mariadb Mariadb | >=10.0.0<10.0.13 | |
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
openSUSE openSUSE | =12.3 | |
openSUSE openSUSE | =13.1 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
Suse Linux Enterprise Workstation Extension | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.