The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1lib.c, statemdtls.c, statemlib.c, and statemsrvr.c.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libssl1.0.0-udeb-dbgsym": "1.0.1f-1ubuntu2.20", "libssl-dev": "1.0.1f-1ubuntu2.20", "libssl1.0.0": "1.0.1f-1ubuntu2.20", "libssl-doc": "1.0.1f-1ubuntu2.20", "libcrypto1.0.0-udeb-dbgsym": "1.0.1f-1ubuntu2.20", "libssl1.0.0-dbg": "1.0.1f-1ubuntu2.20", "libssl-dev-dbgsym": "1.0.1f-1ubuntu2.20", "openssl": "1.0.1f-1ubuntu2.20", "openssl-dbgsym": "1.0.1f-1ubuntu2.20", "libssl1.0.0-udeb": "1.0.1f-1ubuntu2.20", "libssl1.0.0-dbgsym": "1.0.1f-1ubuntu2.20", "libcrypto1.0.0-udeb": "1.0.1f-1ubuntu2.20" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libssl1.0.0-udeb-dbgsym": "1.0.2g-1ubuntu4.4", "libssl-dev": "1.0.2g-1ubuntu4.4", "libssl1.0.0": "1.0.2g-1ubuntu4.4", "libssl-doc": "1.0.2g-1ubuntu4.4", "libcrypto1.0.0-udeb-dbgsym": "1.0.2g-1ubuntu4.4", "libssl1.0.0-dbg": "1.0.2g-1ubuntu4.4", "libssl-dev-dbgsym": "1.0.2g-1ubuntu4.4", "openssl": "1.0.2g-1ubuntu4.4", "openssl-dbgsym": "1.0.2g-1ubuntu4.4", "libssl1.0.0-udeb": "1.0.2g-1ubuntu4.4", "libssl1.0.0-dbgsym": "1.0.2g-1ubuntu4.4", "libcrypto1.0.0-udeb": "1.0.2g-1ubuntu4.4" } ] }