CVE-2014-3505
Published: 7 August 2014
Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
artful |
Released
(1.0.1f-1ubuntu7)
|
bionic |
Released
(1.0.1f-1ubuntu7)
|
|
cosmic |
Released
(1.0.1f-1ubuntu7)
|
|
disco |
Released
(1.0.1f-1ubuntu7)
|
|
lucid |
Released
(0.9.8k-7ubuntu8.20)
|
|
precise |
Released
(1.0.1-4ubuntu5.17)
|
|
trusty |
Released
(1.0.1f-1ubuntu2.5)
|
|
upstream |
Released
(0.9.8zb,1.0.1i)
|
|
utopic |
Released
(1.0.1f-1ubuntu7)
|
|
vivid |
Released
(1.0.1f-1ubuntu7)
|
|
wily |
Released
(1.0.1f-1ubuntu7)
|
|
xenial |
Released
(1.0.1f-1ubuntu7)
|
|
yakkety |
Released
(1.0.1f-1ubuntu7)
|
|
zesty |
Released
(1.0.1f-1ubuntu7)
|
|
Patches: upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2172d4f63c61922487008f42511cc6bdae9b47a0 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=e7b9d9be48cdc598a46c8e1536035ed29a9af254 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1b7024fb69161619855d86b80ae0681ea802e245 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=6a431cd293b283b0c7d2b40faa77f8244a27462f |
||
openssl098 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
lucid |
Does not exist
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(0.9.8zb)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|