Hide Forgot
The following was reported by OpenSSL upstream: This vulnerability does not affect current versions of OpenSSL. It existed in previous OpenSSL versions and was fixed in June 2014. If a DTLS peer receives application data between the ChangeCipherSpec and Finished messages, buffering of such data may cause an invalid free, resulting in a segmentation fault or potentially, memory corruption. This issue affected older OpenSSL versions 1.0.1, 1.0.0 and 0.9.8. OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. This issue was originally reported on March 28th 2014 in https://rt.openssl.org/Ticket/Display.html?id=3286 by Praveen Kariyanahalli, and subsequently by Ivan Fratric and Felix Groebert (Google). A fix was developed by zhu qun-ying. Acknowledgements: Red Hat would like to thank the OpenSSL project for reporting this issue.
Upstream patches: OpenSSL-1.0.1: https://github.com/openssl/openssl/commit/bcc31166 OpenSSL-0.9.8: https://github.com/openssl/openssl/commit/4b258e73
Reference: https://www.openssl.org/news/secadv_20150611.txt
Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1231051]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 6 Via RHSA-2015:1115 https://rhn.redhat.com/errata/RHSA-2015-1115.html
Statement: This issue does NOT affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.
This issue has been addressed in the following products: Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html