SB2015120409 - Fedora 22 update for openssl



SB2015120409 - Fedora 22 update for openssl

Published: December 4, 2015 Updated: April 24, 2025

Security Bulletin ID SB2015120409
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2015-3196)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in the ssl/s3_clnt.c in OpenSSL when used for a multi-threaded client. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system via a crafted ServerKeyExchange message.


2) Information disclosure (CVE-ID: CVE-2015-3195)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists in the ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL. A remote attacker can gain unauthorized access to sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.


3) NULL pointer dereference (CVE-ID: CVE-2015-3194)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in crypto/rsa/rsa_ameth.c in OpenSSL. A remote attacker can trigger denial of service conditions via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.


Remediation

Install update from vendor's website.