MGASA-2015-0466

Source
https://advisories.mageia.org/MGASA-2015-0466.html
Import Source
https://advisories.mageia.org/MGASA-2015-0466.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0466
Related
Published
2015-12-05T10:03:58Z
Modified
2015-12-05T09:54:32Z
Summary
Updated openssl packages fix security vulnerability
Details

If a client receives a ServerKeyExchange for an anonymous DH ciphersuite with the value of p set to 0 then a seg fault can occur leading to a possible denial of service attack (CVE-2015-1794).

Loic Jonas Etienne of Qnective AG discovered that the signature verification routines will crash with a NULL pointer dereference if presented with an ASN.1 signature using the RSA PSS algorithm and absent mask generation function parameter. A remote attacker can exploit this flaw to crash any certificate verification operation and mount a denial of service attack (CVE-2015-3194).

Adam Langley of Google/BoringSSL discovered that OpenSSL will leak memory when presented with a malformed X509_ATTRIBUTE structure (CVE-2015-3195).

A race condition flaw in the handling of PSK identify hints was discovered, potentially leading to a double free of the identify hint data (CVE-2015-3196).

References
Credits

Affected packages

Mageia:5 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2e-1.mga5

Ecosystem specific

{
    "section": "core"
}