Hi Kurt,

On Fri, Jan 16, 2015 at 06:43:36PM +0100, Kurt Roeckx wrote:
> On Fri, Jan 16, 2015 at 04:17:59PM +0300, Andrey Semashev wrote:
> > Package: openssl
> > Version: 1.0.1e-2+deb7u14
> > Severity: important
> > 
> > Dear Maintainer,
> > 
> > I have an application which uses libwebrtc to communicate with third party 
> > WebRTC clients, which are mostly Chrome and Firefox browsers.
> > libwebrtc used in my application is compiled with openssl support to 
> > implement DTLS encryption while Chrome and Firefox, I believe, use libnss.
> > 
> > After the 1.0.1e-2+deb7u14 update my application fails to connect to the 
> > browsers. According to logs, DTLS handshake never completes and times out.
> > 
> > Through experimenting I found out that the problem is with the patch for 
> > CVE-2014-3571 
> > (0109-Fix-crash-in-dtls1_get_record-whilst-in-the-listen-s.patch).
> > If I rebuild the package without that patch the application starts 
> > connecting again. It also works with 1.0.1e-2+deb7u13.
> 
> There is an upstream bug report about the patch for CVE-2014-0206
> breaking it.  Are you sure it's the right patch?
> 
> The fix for that issue was to use SSL_CTX_set_read_ahead() setting
> it to 1.  Can you check that fixes it for you?

Just to avoid confusion, I guess it is CVE-2015-0206, since
CVE-2014-0206 was for linux. Is it this bug you are refering to:
https://rt.openssl.org/Ticket/Display.html?id=3657

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to