Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Mariadb Subscribe
Mariadb Subscribe
Openssl Subscribe
Openssl Subscribe
Enterprise Linux Subscribe
Storage Subscribe
Linux Enterprise Desktop Subscribe
Linux Enterprise Server Subscribe
Linux Enterprise Software Development Kit Subscribe
Linux Enterprise Workstation Extension Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2908-1 openssl security update
Ubuntu USN Ubuntu USN USN-2192-1 OpenSSL vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://advisories.mageia.org/MGASA-2014-0187.html cve-icon cve-icon
http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=140389274407904&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=140389355508263&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=140431828824371&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=140448122410568&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=140544599631400&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=140621259019789&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=140752315422991&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=140904544427729&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141658880509699&w=2 cve-icon cve-icon
http://openwall.com/lists/oss-security/2014/04/13/1 cve-icon cve-icon
http://seclists.org/fulldisclosure/2014/Dec/23 cve-icon cve-icon
http://secunia.com/advisories/58337 cve-icon cve-icon
http://secunia.com/advisories/58713 cve-icon cve-icon
http://secunia.com/advisories/58939 cve-icon cve-icon
http://secunia.com/advisories/58977 cve-icon cve-icon
http://secunia.com/advisories/59162 cve-icon cve-icon
http://secunia.com/advisories/59287 cve-icon cve-icon
http://secunia.com/advisories/59300 cve-icon cve-icon
http://secunia.com/advisories/59301 cve-icon cve-icon
http://secunia.com/advisories/59342 cve-icon cve-icon
http://secunia.com/advisories/59413 cve-icon cve-icon
http://secunia.com/advisories/59437 cve-icon cve-icon
http://secunia.com/advisories/59438 cve-icon cve-icon
http://secunia.com/advisories/59440 cve-icon cve-icon
http://secunia.com/advisories/59450 cve-icon cve-icon
http://secunia.com/advisories/59490 cve-icon cve-icon
http://secunia.com/advisories/59655 cve-icon cve-icon
http://secunia.com/advisories/59666 cve-icon cve-icon
http://secunia.com/advisories/59669 cve-icon cve-icon
http://secunia.com/advisories/59721 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-201407-05.xml cve-icon cve-icon
http://support.citrix.com/article/CTX140876 cve-icon cve-icon
http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup cve-icon cve-icon
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21673137 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21676035 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21676062 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21676419 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21676529 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21676655 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21676879 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21676889 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21677527 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21677695 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21677828 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21677836 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21678167 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21683332 cve-icon cve-icon
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 cve-icon cve-icon
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 cve-icon cve-icon
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 cve-icon cve-icon
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 cve-icon cve-icon
http://www.blackberry.com/btsc/KB36051 cve-icon cve-icon
http://www.fortiguard.com/advisory/FG-IR-14-018/ cve-icon cve-icon
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm cve-icon cve-icon
http://www.ibm.com/support/docview.wss?uid=swg21676356 cve-icon cve-icon
http://www.ibm.com/support/docview.wss?uid=swg24037783 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2014:090 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 cve-icon cve-icon
http://www.openbsd.org/errata55.html#004_openssl cve-icon cve-icon
http://www.openssl.org/news/secadv_20140605.txt cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/534161/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/66801 cve-icon cve-icon
http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2014-0006.html cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2014-0012.html cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 cve-icon cve-icon
https://kb.bluecoat.com/index?page=content&id=SA80 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-5298 cve-icon
https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest cve-icon cve-icon
https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-5298 cve-icon
https://www.novell.com/support/kb/doc.php?id=7015271 cve-icon cve-icon
https://www.openssl.org/news/secadv_20140605.txt cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T04:17:10.312Z

Reserved: 2014-04-14T00:00:00.000Z

Link: CVE-2010-5298

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-04-14T22:38:08.590

Modified: 2025-04-12T10:46:40.837

Link: CVE-2010-5298

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-04-08T00:00:00Z

Links: CVE-2010-5298 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses