Summary: | <dev-libs/openssl-1.0.2h-r2: Possible integer overflow vulnerabilities in codebase (CVE-2016-2177) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | base-system |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1341705 | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 585276 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2016-06-06 07:27:34 UTC
CVE-2016-2177 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177): OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c. Fixed in openssl-1.0.2h-r2 https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=b4bfc10ce01e37a79da48f2f8349200c7eca78ed This issue was resolved and addressed in GLSA 201612-16 at https://security.gentoo.org/glsa/201612-16 by GLSA coordinator Aaron Bauman (b-man). |