Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2015-3196

Published: 3 December 2015

ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.

Notes

AuthorNote
mdeslaur
1.0.0, 1.0.1 and 1.0.2 only

Priority

Low

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
precise
Released (1.0.1-4ubuntu5.32)
trusty
Released (1.0.1f-1ubuntu2.16)
upstream
Released (1.0.2d,1.0.1p)
vivid
Released (1.0.1f-1ubuntu11.5)
wily Not vulnerable
(1.0.2d-0ubuntu1)
Patches:
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=d6be3124f22870f1888c532523b74ea5d89795eb (1.0.1)
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=3c66a669dfc7b3792f7af0758ea26fe8502ce70c (1.0.2)
openssl098
Launchpad, Ubuntu, Debian
precise Not vulnerable

trusty Does not exist
(trusty was not-affected)
upstream Not vulnerable

vivid Not vulnerable

wily Does not exist