CVE-2014-3571
Published: 8 January 2015
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
artful |
Released
(1.0.1f-1ubuntu10)
|
bionic |
Released
(1.0.1f-1ubuntu10)
|
|
cosmic |
Released
(1.0.1f-1ubuntu10)
|
|
disco |
Released
(1.0.1f-1ubuntu10)
|
|
lucid |
Released
(0.9.8k-7ubuntu8.23)
|
|
precise |
Released
(1.0.1-4ubuntu5.21)
|
|
trusty |
Released
(1.0.1f-1ubuntu2.8)
|
|
upstream |
Released
(0.9.8zd, 1.0.1k)
|
|
utopic |
Released
(1.0.1f-1ubuntu9.1)
|
|
vivid |
Released
(1.0.1f-1ubuntu10)
|
|
wily |
Released
(1.0.1f-1ubuntu10)
|
|
xenial |
Released
(1.0.1f-1ubuntu10)
|
|
yakkety |
Released
(1.0.1f-1ubuntu10)
|
|
zesty |
Released
(1.0.1f-1ubuntu10)
|
|
Patches: upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8d7aab986b499f34d9e1bc58fbfd77f05c38116e upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=45fe66b8ba026186aa5d8ef1e0e6010ea74d5c0b upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=46bf0ba87665c5aa215673d87e9ee7dd4ce28359 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=50befdb659585b9840264c77708d2dc638624137 |
||
openssl098 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
lucid |
Does not exist
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(0.9.8zd, 1.0.1k)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|