First published: Mon Dec 14 2015(Updated: )
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)<br>and Transport Layer Security (TLS v1) protocols, as well as a<br>full-strength, general purpose cryptography library.<br>A NULL pointer derefernce flaw was found in the way OpenSSL verified<br>signatures using the RSA PSS algorithm. A remote attacked could possibly<br>use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server<br>using OpenSSL if it enabled client authentication. (CVE-2015-3194)<br>A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and<br>CMS data. A remote attacker could use this flaw to cause an application<br>that parses PKCS#7 or CMS data from untrusted sources to use an excessive<br>amount of memory and possibly crash. (CVE-2015-3195)<br>A race condition flaw, leading to a double free, was found in the way<br>OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker<br>could use this flaw to crash a multi-threaded SSL/TLS client using<br>OpenSSL. (CVE-2015-3196)<br>All openssl users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. For the update to take<br>effect, all services linked to the OpenSSL library must be restarted, or<br>the system rebooted.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-debuginfo | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-debuginfo | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-devel | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-devel | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-libs | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-libs | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-perl | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-static | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-static | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl-debuginfo | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl-debuginfo | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl-devel | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl-devel | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl-perl | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl-static | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl-perl | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl-static | <1.0.1e-42.el6_7.1 | 1.0.1e-42.el6_7.1 |
redhat/openssl | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
redhat/openssl-perl | <1.0.1e-51.el7_2.1 | 1.0.1e-51.el7_2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2015:2617 is classified as important.
To fix RHSA-2015:2617, upgrade to the version 1.0.1e-51.el7_2.1 or later of the affected packages.
RHSA-2015:2617 affects various OpenSSL packages including openssl, openssl-devel, and openssl-libs.
RHSA-2015:2617 addresses a NULL pointer dereference flaw in OpenSSL.
There is no official workaround for RHSA-2015:2617; the recommended action is to apply the update.