Thank you very much for the update in a quick time.

On Sat, Aug 9, 2014 at 12:09 AM, Matt Caswell <m...@openssl.org> wrote:

>
>
> On 08/08/14 12:26, Matt Caswell wrote:
>
> > Hi Jaya
> >
> > CVE-2014-3505 has two sites which are affected by the same problem
> > (either of these can be present for the issue to occur). One
> > of these is dtls1_reassemble_fragment, which you rightly say was not
> > introduced until 0.9.8o. However the other site is in
> > dtls1_process_out_of_seq_message. This issue was introduced in 0.9.8m.
> > Therefore 0.9.8 - 0.9.8l are not affected.
> >
> > CVE-2014-3506 primarily addresses issues in dtls1_reassemble_fragment.
> > However it does also address a problem in the non-fragmented case where
> > there was no check for the maximum handshake message size, and this
> > problem also exists in 0.9.8. Therefore 0.9.8 is still affected.
> >
> > CVE-2014-3507 deals with an issue where zero length fragments result in
> > a memory leak due to a flaw in the logic regarding reassembling
> > fragments. Since this logic does not exist in 0.9.8 - 0.9.8n, you are
> > correct that they are not affected.
> >
> > I will correct the Security Advisory and the vulnerabilities page with
> > regards to CVE-2014-3505 and CVE-2014-3507.
>
> I have updated the vulnerabilities page (should show on the web site
> soon). I haven't updated the Security Advisory as I think the advice is
> still correct (0.9.8 users are advised to upgrade to 0.9.8zb).
>
> As noted in another thread CVE-2014-3507 only applies to 0.9.8o onwards
> and 1.0.0a onwards (i.e. not 1.0.0).
>
> Matt
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to