CESA-2015:2617 -- centos 6 openssl
|ID: oval:org.secpod.oval:def:203783||Date: (C)2015-12-23 (M)2018-01-22|
|Class: PATCH||Family: unix|
OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. A NULL pointer derefernce flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacked could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication. A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.