~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2014-3571

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2015-01-08
2
 
Candidate: CVE-2014-3571
3
 
PublicDate: 2015-01-08
4
 
References: 
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
6
 
 https://www.openssl.org/news/secadv_20150108.txt
7
 
 https://usn.ubuntu.com/usn/usn-2459-1
8
 
Description:
9
 
 OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows
10
 
 remote attackers to cause a denial of service (NULL pointer dereference and
11
 
 application crash) via a crafted DTLS message that is processed with a
12
 
 different read operation for the handshake header than for the handshake
13
 
 body, related to the dtls1_get_record function in d1_pkt.c and the
14
 
 ssl3_read_n function in s3_pkt.c.
15
 
Ubuntu-Description: 
16
 
Notes: 
17
 
Bugs: 
18
 
Priority: medium
19
 
Discovered-by: Markus Stenberg
20
 
Assigned-to: mdeslaur
21
 
 
22
 
Patches_openssl:
23
 
 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8d7aab986b499f34d9e1bc58fbfd77f05c38116e (1.0.1)
24
 
 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=45fe66b8ba026186aa5d8ef1e0e6010ea74d5c0b (1.0.1)
25
 
 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=46bf0ba87665c5aa215673d87e9ee7dd4ce28359 (0.9.8)
26
 
 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=50befdb659585b9840264c77708d2dc638624137 (0.9.8)
27
 
upstream_openssl: released (0.9.8zd, 1.0.1k)
28
 
lucid_openssl: released (0.9.8k-7ubuntu8.23)
29
 
precise_openssl: released (1.0.1-4ubuntu5.21)
30
 
precise/esm_openssl: released (1.0.1-4ubuntu5.21)
31
 
trusty_openssl: released (1.0.1f-1ubuntu2.8)
32
 
utopic_openssl: released (1.0.1f-1ubuntu9.1)
33
 
vivid_openssl: released (1.0.1f-1ubuntu10)
34
 
vivid/stable-phone-overlay_openssl: released (1.0.1f-1ubuntu10)
35
 
vivid/ubuntu-core_openssl: released (1.0.1f-1ubuntu10)
36
 
wily_openssl: released (1.0.1f-1ubuntu10)
37
 
xenial_openssl: released (1.0.1f-1ubuntu10)
38
 
yakkety_openssl: released (1.0.1f-1ubuntu10)
39
 
zesty_openssl: released (1.0.1f-1ubuntu10)
40
 
artful_openssl: released (1.0.1f-1ubuntu10)
41
 
bionic_openssl: released (1.0.1f-1ubuntu10)
42
 
devel_openssl: released (1.0.1f-1ubuntu10)
43
 
 
44
 
Patches_openssl098:
45
 
upstream_openssl098: released (0.9.8zd, 1.0.1k)
46
 
lucid_openssl098: DNE
47
 
precise_openssl098: ignored (reached end-of-life)
48
 
precise/esm_openssl098: DNE (precise was needed)
49
 
trusty_openssl098: needed
50
 
utopic_openssl098: ignored (reached end-of-life)
51
 
vivid_openssl098: ignored (reached end-of-life)
52
 
vivid/stable-phone-overlay_openssl098: DNE
53
 
vivid/ubuntu-core_openssl098: DNE
54
 
wily_openssl098: DNE
55
 
xenial_openssl098: DNE
56
 
yakkety_openssl098: DNE
57
 
zesty_openssl098: DNE
58
 
artful_openssl098: DNE
59
 
bionic_openssl098: DNE
60
 
devel_openssl098: DNE