Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 507694 (CVE-2010-5298) - dev-libs/openssl : freelist misuse causing a possible use-after-free
Summary: dev-libs/openssl : freelist misuse causing a possible use-after-free
Status: RESOLVED WORKSFORME
Alias: CVE-2010-5298
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: A3 [upstream/ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-04-15 09:47 UTC by Agostino Sarubbo
Modified: 2014-04-20 05:46 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-04-15 09:47:53 UTC
From ${URL} :

The following security advisory was reported by OpenBSD:

OpenBSD 5.4 errata 8, Apr 12, 2014:  A use-after-free race condition in OpenSSL's read buffer may permit 
an attacker to inject data from one connection into another.

Reference:

http://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/008_openssl.patch
http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 SpanKY gentoo-dev 2014-04-20 03:16:50 UTC
seems like consensus is it's a non issue
Comment 2 Joshua Kinard gentoo-dev 2014-04-20 05:46:34 UTC
(In reply to SpanKY from comment #1)
> seems like consensus is it's a non issue

Yeah, not a security threat, but still a very weird way for OpenSSL to handle memory.  Still a bug in my book, but one that can follow normal stabilization procedures when upstream does patch it.