CVE-2015-3196
Published: 3 December 2015
ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
Notes
Author | Note |
---|---|
mdeslaur | 1.0.0, 1.0.1 and 1.0.2 only |
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
precise |
Released
(1.0.1-4ubuntu5.32)
|
trusty |
Released
(1.0.1f-1ubuntu2.16)
|
|
upstream |
Released
(1.0.2d,1.0.1p)
|
|
vivid |
Released
(1.0.1f-1ubuntu11.5)
|
|
wily |
Not vulnerable
(1.0.2d-0ubuntu1)
|
|
Patches: upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=d6be3124f22870f1888c532523b74ea5d89795eb (1.0.1) upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=3c66a669dfc7b3792f7af0758ea26fe8502ce70c (1.0.2) |
||
openssl098 Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
|
trusty |
Does not exist
(trusty was not-affected)
|
|
upstream |
Not vulnerable
|
|
vivid |
Not vulnerable
|
|
wily |
Does not exist
|