A NULL pointer dereference flaw was found in the way OpenSSL handled renegotiation requests with an invalid Signature Algorithms extension. A remote attacker could use this flaw to cause an OpenSSL server to crash.
This issue affects OpenSSL version 1.0.2, and was fixed in version 1.0.2a.
Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges David Ramos of Stanford University as the original reporter.
Affected code was introduced upstream in version 1.0.2 via this commit:
It does not existing in openssl packages in Red Hat Enterprise Linux 7 and earlier.
This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 5, 6, and 7.