Common Vulnerabilities and Exposures assigned an identifier CVE-2014-9424 to the following vulnerability:
Reference: MISC: https://code.google.com/p/google-security-research/issues/detail?id=202
Reference: CONFIRM: https://github.com/robertbachmann/openbsd-libssl/commit/62a110d447bb8c16a4c69629e28a42e8c39fd7e0
Double free vulnerability in the ssl_parse_clienthello_use_srtp_ext function in d1_srtp.c in LibreSSL before 2.1.2 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a certain length-verification error during processing of a DTLS handshake.
This flaw arises because an attempt is made to free the "clnt" structure, which has been already freed previously, resulting in a possible double-free issue. (Looks like just Dos, unless clnt could be user-controlled).
OpenSSL code does not contain the vulnerable code. No "clnt" variable exists in the ssl_parse_clienthello_use_srtp_ext() function.
Not vulnerable. This issue does not affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5, 6 and 7.
This issue does not affect the version of OpenSSL package, as shipped in Fedora 19, 20 and 21.