openssl: unproper managing of a buffer pointer in s3_pkt.c (CVE-2014-0198)
The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1093837
•CONFIRM:
https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
•OPENBSD:[5.5] 005: RELIABILITY FIX: May 1, 2014
•URL: http://www.openbsd.org/errata55.html\#005\_openssl
(from redmine: issue id 2916, created on 2014-05-21, closed on 2014-05-30)
- Relations:
- child #2917 (closed)
- child #2918 (closed)
- child #2919 (closed)
- Changesets:
- Revision 5b76f90f by Timo Teräs on 2014-05-29T14:42:27Z:
main/openssl: security fix to CVE-2014-0198
ref #2916