Hide Forgot
A NULL pointer dereference flaw was found in the way OpenSSL handled renegotiation requests with an invalid Signature Algorithms extension. A remote attacker could use this flaw to cause an OpenSSL server to crash. This issue affects OpenSSL version 1.0.2, and was fixed in version 1.0.2a. Acknowledgements: Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges David Ramos of Stanford University as the original reporter.
Affected code was introduced upstream in version 1.0.2 via this commit: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c70a1fee It does not existing in openssl packages in Red Hat Enterprise Linux 7 and earlier. Statement: This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 5, 6, and 7.
External References: https://openssl.org/news/secadv_20150319.txt https://access.redhat.com/articles/1384453
Upstream commit: https://git.openssl.org/?p=openssl.git;a=commitdiff;h=76343947ada960b6269090638f5391068daee88d