First published: Mon Jun 02 2014(Updated: )
As per the upstream advisory: OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack. OpenSSL 1.0.0 users should upgrade to 1.0.0m. OpenSSL 1.0.1 users should upgrade to 1.0.1h. Acknowledgements: Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Felix Gröbert and Ivan Fratrić of Google as the original reporters of this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <0.9.8 | 0.9.8 |
OpenSSL OpenSSL | <0.9.8za | |
OpenSSL OpenSSL | >=1.0.0<1.0.0m | |
OpenSSL OpenSSL | >=1.0.1<1.0.1h | |
Redhat Storage | =2.1 | |
Fedoraproject Fedora | ||
Redhat Enterprise Linux | =5 | |
Redhat Enterprise Linux | =6.0 | |
Mariadb Mariadb | >=10.0.0<10.0.13 | |
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
openSUSE Leap | =42.1 | |
openSUSE openSUSE | =13.2 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
Suse Linux Enterprise Workstation Extension | =12 |
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8011cd56e39a433b1837465259a9bd24a38727fb
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.