CVE-2010-3864

Publication date 17 November 2010

Last updated 24 July 2024


Ubuntu priority

Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.

Status

Package Ubuntu Release Status
openssl 10.10 maverick
Fixed 0.9.8o-1ubuntu4.2
10.04 LTS lucid
Fixed 0.9.8k-7ubuntu8.4
9.10 karmic
Fixed 0.9.8g-16ubuntu3.4
8.04 LTS hardy
Fixed 0.9.8g-4ubuntu3.12
6.06 LTS dapper
Not affected

References

Related Ubuntu Security Notices (USN)

    • USN-1018-1
    • OpenSSL vulnerability
    • 18 November 2010

Other references