Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 16 Mar 2015 09:04:38 +0100
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: CVE Request: memory leak in openssl "hostname" TLS Extension

Hi,

Reported to us by a customer.

The "hostname" TLS extension in openssl had a memory leak, fixed in 2009:

https://github.com/openssl/openssl/commit/7587347bc48e7e8a1e800e48bb0a658f1557c424

commit 7587347bc48e7e8a1e800e48bb0a658f1557c424
Author: Ben Laurie <ben@...nssl.org>
Date:   Mon Feb 23 16:40:59 2009 +0000

    Fix memory leak.

Fixed in 0.9.8g. (did not check 0.9.7, the extension was introduced in the 0.9.7 lifetime somewhen)

1.0.0 and 1.0.1 already contained the fix as they shipped.

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ