First published: Tue Sep 20 2016(Updated: )
A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.23-120.jbcs.el6 | 0:2.4.23-120.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-13.jbcs.el6 | 1:1.0.2h-13.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.23-120.jbcs.el7 | 0:2.4.23-120.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-13.jbcs.el7 | 1:1.0.2h-13.jbcs.el7 |
redhat/openssl | <0:1.0.1e-48.el6_8.3 | 0:1.0.1e-48.el6_8.3 |
redhat/openssl | <0:1.0.0-20.el6_2.9 | 0:1.0.0-20.el6_2.9 |
redhat/openssl | <0:1.0.0-27.el6_4.6 | 0:1.0.0-27.el6_4.6 |
redhat/openssl | <0:1.0.1e-16.el6_5.17 | 0:1.0.1e-16.el6_5.17 |
redhat/openssl | <0:1.0.1e-30.el6_6.13 | 0:1.0.1e-30.el6_6.13 |
redhat/openssl | <0:1.0.1e-42.el6_7.6 | 0:1.0.1e-42.el6_7.6 |
redhat/openssl | <1:1.0.1e-51.el7_2.7 | 1:1.0.1e-51.el7_2.7 |
redhat/tomcat6 | <0:6.0.41-17_patch_04.ep6.el6 | 0:6.0.41-17_patch_04.ep6.el6 |
redhat/tomcat7 | <0:7.0.54-25_patch_05.ep6.el6 | 0:7.0.54-25_patch_05.ep6.el6 |
redhat/tomcat6 | <0:6.0.41-17_patch_04.ep6.el7 | 0:6.0.41-17_patch_04.ep6.el7 |
redhat/tomcat7 | <0:7.0.54-25_patch_05.ep6.el7 | 0:7.0.54-25_patch_05.ep6.el7 |
redhat/log4j-eap6 | <0:1.2.16-12.redhat_3.1.ep6.el6 | 0:1.2.16-12.redhat_3.1.ep6.el6 |
redhat/tomcat7 | <0:7.0.70-22.ep7.el6 | 0:7.0.70-22.ep7.el6 |
redhat/tomcat8 | <0:8.0.36-24.ep7.el6 | 0:8.0.36-24.ep7.el6 |
redhat/tomcat-native | <0:1.2.8-10.redhat_10.ep7.el6 | 0:1.2.8-10.redhat_10.ep7.el6 |
redhat/log4j-eap6 | <0:1.2.16-12.redhat_3.1.ep6.el7 | 0:1.2.16-12.redhat_3.1.ep6.el7 |
redhat/tomcat7 | <0:7.0.70-22.ep7.el7 | 0:7.0.70-22.ep7.el7 |
redhat/tomcat8 | <0:8.0.36-24.ep7.el7 | 0:8.0.36-24.ep7.el7 |
redhat/tomcat-native | <0:1.2.8-10.redhat_10.ep7.el7 | 0:1.2.8-10.redhat_10.ep7.el7 |
OpenSSL OpenSSL | =1.0.2 | |
OpenSSL OpenSSL | =1.0.2-beta1 | |
OpenSSL OpenSSL | =1.0.2-beta2 | |
OpenSSL OpenSSL | =1.0.2-beta3 | |
OpenSSL OpenSSL | =1.0.2a | |
OpenSSL OpenSSL | =1.0.2b | |
OpenSSL OpenSSL | =1.0.2c | |
OpenSSL OpenSSL | =1.0.2d | |
OpenSSL OpenSSL | =1.0.2e | |
OpenSSL OpenSSL | =1.0.2f | |
OpenSSL OpenSSL | =1.0.2h | |
OpenSSL OpenSSL | =1.1.0 | |
OpenSSL OpenSSL | =1.0.1 | |
OpenSSL OpenSSL | =1.0.1-beta1 | |
OpenSSL OpenSSL | =1.0.1-beta2 | |
OpenSSL OpenSSL | =1.0.1-beta3 | |
OpenSSL OpenSSL | =1.0.1a | |
OpenSSL OpenSSL | =1.0.1b | |
OpenSSL OpenSSL | =1.0.1c | |
OpenSSL OpenSSL | =1.0.1d | |
OpenSSL OpenSSL | =1.0.1e | |
OpenSSL OpenSSL | =1.0.1f | |
OpenSSL OpenSSL | =1.0.1g | |
OpenSSL OpenSSL | =1.0.1h | |
OpenSSL OpenSSL | =1.0.1i | |
OpenSSL OpenSSL | =1.0.1j | |
OpenSSL OpenSSL | =1.0.1k | |
OpenSSL OpenSSL | =1.0.1l | |
OpenSSL OpenSSL | =1.0.1m | |
OpenSSL OpenSSL | =1.0.1n | |
OpenSSL OpenSSL | =1.0.1o | |
OpenSSL OpenSSL | =1.0.1p | |
OpenSSL OpenSSL | =1.0.1q | |
OpenSSL OpenSSL | =1.0.1r | |
OpenSSL OpenSSL | =1.0.1s | |
OpenSSL OpenSSL | =1.0.1t | |
Nodejs Node.js | >=0.10.0<0.10.47 | |
Nodejs Node.js | >=0.12.0<0.12.16 | |
Nodejs Node.js | >=4.0.0<4.6.0 | |
Nodejs Node.js | >=6.0.0<6.7.0 | |
Novell Suse Linux Enterprise Module For Web Scripting | =12.0 | |
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
redhat/openssl | <1.1.0 | 1.1.0 |
Advantech Spectre RT ERT351 firmware Versions 5.1.3 and prior | ||
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.3.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)