Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
References
Configurations
History
No history.
Information
Published : 2015-07-07 10:59
Updated : 2018-01-05 02:30
NVD link : CVE-2015-3216
Mitre link : CVE-2015-3216
CVE.ORG link : CVE-2015-3216
JSON object : View
Products Affected
openssl
- openssl
redhat
- enterprise_linux