First published: Sat Apr 23 2016(Updated: )
A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
redhat/openssl | <0:1.0.1e-48.el6_8.1 | 0:1.0.1e-48.el6_8.1 |
redhat/openssl | <0:1.0.1e-42.el6_7.5 | 0:1.0.1e-42.el6_7.5 |
redhat/openssl | <1:1.0.1e-51.el7_2.5 | 1:1.0.1e-51.el7_2.5 |
Google Android | ||
OpenSSL libcrypto | <=1.0.1s | |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2-beta2 | |
OpenSSL libcrypto | =1.0.2-beta3 | |
OpenSSL libcrypto | =1.0.2a | |
OpenSSL libcrypto | =1.0.2b | |
OpenSSL libcrypto | =1.0.2c | |
OpenSSL libcrypto | =1.0.2d | |
OpenSSL libcrypto | =1.0.2e | |
OpenSSL libcrypto | =1.0.2f | |
OpenSSL libcrypto | =1.0.2g | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise linux hpc node | =7.0 | |
redhat enterprise linux hpc node eus | =7.2 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux workstation | =7.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise linux hpc node | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)