CVE-2010-5298

Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0187.html Third Party Advisory
http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig Patch Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 Permissions Required
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140389274407904&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140389355508263&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140431828824371&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140448122410568&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140544599631400&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140621259019789&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140752315422991&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=140904544427729&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=141658880509699&w=2 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2014/04/13/1 Mailing List Patch
http://seclists.org/fulldisclosure/2014/Dec/23 Mailing List Third Party Advisory
http://secunia.com/advisories/58337 Not Applicable
http://secunia.com/advisories/58713 Not Applicable
http://secunia.com/advisories/58939 Not Applicable
http://secunia.com/advisories/58977 Not Applicable
http://secunia.com/advisories/59162 Not Applicable
http://secunia.com/advisories/59287 Not Applicable
http://secunia.com/advisories/59300 Not Applicable
http://secunia.com/advisories/59301 Not Applicable
http://secunia.com/advisories/59342 Not Applicable
http://secunia.com/advisories/59413 Not Applicable
http://secunia.com/advisories/59437 Not Applicable
http://secunia.com/advisories/59438 Not Applicable
http://secunia.com/advisories/59440 Not Applicable
http://secunia.com/advisories/59450 Not Applicable
http://secunia.com/advisories/59490 Not Applicable
http://secunia.com/advisories/59655 Not Applicable
http://secunia.com/advisories/59666 Not Applicable
http://secunia.com/advisories/59669 Not Applicable
http://secunia.com/advisories/59721 Not Applicable
http://security.gentoo.org/glsa/glsa-201407-05.xml Third Party Advisory
http://support.citrix.com/article/CTX140876 Third Party Advisory
http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup Broken Link
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21673137 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676035 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676062 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676419 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676529 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676655 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21676879 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21676889 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21677527 Broken Link
http://www-01.ibm.com/support/docview.wss?uid=swg21677695 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677828 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21677836 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21678167 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683332 Third Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 Broken Link
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 Broken Link
http://www.blackberry.com/btsc/KB36051 Broken Link
http://www.fortiguard.com/advisory/FG-IR-14-018/ Third Party Advisory
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21676356 Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg24037783 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2014:090 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 Broken Link
http://www.openbsd.org/errata55.html#004_openssl Third Party Advisory
http://www.openssl.org/news/secadv_20140605.txt Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html Third Party Advisory
http://www.securityfocus.com/archive/1/534161/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/66801 Third Party Advisory VDB Entry
http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0006.html Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0012.html Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 Third Party Advisory
https://kb.bluecoat.com/index?page=content&id=SA80 Broken Link
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 Broken Link
https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest Broken Link
https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest Broken Link
https://www.novell.com/support/kb/doc.php?id=7015271 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*

History

29 Aug 2022, 20:53

Type Values Removed Values Added
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676655 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676655 - Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=140544599631400&w=2 - (HP) http://marc.info/?l=bugtraq&m=140544599631400&w=2 - Mailing List, Third Party Advisory
References (CONFIRM) http://www.blackberry.com/btsc/KB36051 - (CONFIRM) http://www.blackberry.com/btsc/KB36051 - Broken Link
References (CONFIRM) http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup - (CONFIRM) http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html - Mailing List, Third Party Advisory
References (CONFIRM) http://www.vmware.com/security/advisories/VMSA-2014-0006.html - (CONFIRM) http://www.vmware.com/security/advisories/VMSA-2014-0006.html - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21673137 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21673137 - Broken Link
References (CONFIRM) http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 - (CONFIRM) http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 - Broken Link
References (HP) http://marc.info/?l=bugtraq&m=140904544427729&w=2 - (HP) http://marc.info/?l=bugtraq&m=140904544427729&w=2 - Mailing List, Third Party Advisory
References (CISCO) http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl - (CISCO) http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl - Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=140431828824371&w=2 - (HP) http://marc.info/?l=bugtraq&m=140431828824371&w=2 - Mailing List, Third Party Advisory
References (MISC) https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest - (MISC) https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest - Broken Link
References (HP) http://marc.info/?l=bugtraq&m=140448122410568&w=2 - (HP) http://marc.info/?l=bugtraq&m=140448122410568&w=2 - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59342 - (SECUNIA) http://secunia.com/advisories/59342 - Not Applicable
References (GENTOO) http://security.gentoo.org/glsa/glsa-201407-05.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201407-05.xml - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21683332 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21683332 - Third Party Advisory
References (CONFIRM) http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 - (CONFIRM) http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 - Broken Link
References (CONFIRM) https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 - (CONFIRM) https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 - Third Party Advisory
References (CONFIRM) http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 - (CONFIRM) http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 - Permissions Required
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677695 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677695 - Third Party Advisory
References (CONFIRM) https://kb.bluecoat.com/index?page=content&id=SA80 - (CONFIRM) https://kb.bluecoat.com/index?page=content&id=SA80 - Broken Link
References (SECUNIA) http://secunia.com/advisories/59440 - (SECUNIA) http://secunia.com/advisories/59440 - Not Applicable
References (SECUNIA) http://secunia.com/advisories/59413 - (SECUNIA) http://secunia.com/advisories/59413 - Not Applicable
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677828 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677828 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59287 - (SECUNIA) http://secunia.com/advisories/59287 - Not Applicable
References (HP) http://marc.info/?l=bugtraq&m=140389355508263&w=2 - (HP) http://marc.info/?l=bugtraq&m=140389355508263&w=2 - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59666 - (SECUNIA) http://secunia.com/advisories/59666 - Not Applicable
References (MISC) https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest - (MISC) https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest - Broken Link
References (CONFIRM) http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm - (CONFIRM) http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/58337 - (SECUNIA) http://secunia.com/advisories/58337 - Not Applicable
References (HP) http://marc.info/?l=bugtraq&m=140752315422991&w=2 - (HP) http://marc.info/?l=bugtraq&m=140752315422991&w=2 - Mailing List, Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677836 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677836 - Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - Third Party Advisory
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html - Mailing List, Third Party Advisory
References (MLIST) http://openwall.com/lists/oss-security/2014/04/13/1 - Patch (MLIST) http://openwall.com/lists/oss-security/2014/04/13/1 - Mailing List, Patch
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676879 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676879 - Broken Link
References (SECUNIA) http://secunia.com/advisories/59301 - (SECUNIA) http://secunia.com/advisories/59301 - Not Applicable
References (BUGTRAQ) http://www.securityfocus.com/archive/1/534161/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/534161/100/0/threaded - Third Party Advisory, VDB Entry
References (CONFIRM) http://advisories.mageia.org/MGASA-2014-0187.html - (CONFIRM) http://advisories.mageia.org/MGASA-2014-0187.html - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676529 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676529 - Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - Third Party Advisory
References (CONFIRM) http://support.citrix.com/article/CTX140876 - (CONFIRM) http://support.citrix.com/article/CTX140876 - Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=140621259019789&w=2 - (HP) http://marc.info/?l=bugtraq&m=140621259019789&w=2 - Mailing List, Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2014:090 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2014:090 - Broken Link
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html - Mailing List, Third Party Advisory
References (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg21676356 - (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg21676356 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677527 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21677527 - Broken Link
References (CONFIRM) http://www.openssl.org/news/secadv_20140605.txt - (CONFIRM) http://www.openssl.org/news/secadv_20140605.txt - Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 - Broken Link
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676889 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676889 - Broken Link
References (FULLDISC) http://seclists.org/fulldisclosure/2014/Dec/23 - (FULLDISC) http://seclists.org/fulldisclosure/2014/Dec/23 - Mailing List, Third Party Advisory
References (CONFIRM) http://www.fortiguard.com/advisory/FG-IR-14-018/ - (CONFIRM) http://www.fortiguard.com/advisory/FG-IR-14-018/ - Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=140389274407904&w=2 - (HP) http://marc.info/?l=bugtraq&m=140389274407904&w=2 - Mailing List, Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=141658880509699&w=2 - (HP) http://marc.info/?l=bugtraq&m=141658880509699&w=2 - Mailing List, Third Party Advisory
References (MISC) http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse - (MISC) http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21678167 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21678167 - Third Party Advisory
References (CONFIRM) https://kc.mcafee.com/corporate/index?page=content&id=SB10075 - (CONFIRM) https://kc.mcafee.com/corporate/index?page=content&id=SB10075 - Broken Link
References (SECUNIA) http://secunia.com/advisories/58977 - (SECUNIA) http://secunia.com/advisories/58977 - Not Applicable
References (SECUNIA) http://secunia.com/advisories/59655 - (SECUNIA) http://secunia.com/advisories/59655 - Not Applicable
References (SECUNIA) http://secunia.com/advisories/59162 - (SECUNIA) http://secunia.com/advisories/59162 - Not Applicable
References (OPENBSD) http://www.openbsd.org/errata55.html#004_openssl - (OPENBSD) http://www.openbsd.org/errata55.html#004_openssl - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59300 - (SECUNIA) http://secunia.com/advisories/59300 - Not Applicable
References (CONFIRM) https://www.novell.com/support/kb/doc.php?id=7015271 - (CONFIRM) https://www.novell.com/support/kb/doc.php?id=7015271 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59438 - (SECUNIA) http://secunia.com/advisories/59438 - Not Applicable
References (SECUNIA) http://secunia.com/advisories/59437 - (SECUNIA) http://secunia.com/advisories/59437 - Not Applicable
References (CONFIRM) http://www.vmware.com/security/advisories/VMSA-2014-0012.html - (CONFIRM) http://www.vmware.com/security/advisories/VMSA-2014-0012.html - Third Party Advisory
References (CONFIRM) http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig - (CONFIRM) http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig - Patch, Third Party Advisory
References (CONFIRM) http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 - (CONFIRM) http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 - Broken Link
References (SECUNIA) http://secunia.com/advisories/58713 - (SECUNIA) http://secunia.com/advisories/58713 - Not Applicable
References (CONFIRM) http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 - (CONFIRM) http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59490 - (SECUNIA) http://secunia.com/advisories/59490 - Not Applicable
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676035 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676035 - Broken Link
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676062 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676062 - Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/66801 - (BID) http://www.securityfocus.com/bid/66801 - Third Party Advisory, VDB Entry
References (CONFIRM) http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 - (CONFIRM) http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 - Broken Link
References (SECUNIA) http://secunia.com/advisories/58939 - (SECUNIA) http://secunia.com/advisories/58939 - Not Applicable
References (SECUNIA) http://secunia.com/advisories/59669 - (SECUNIA) http://secunia.com/advisories/59669 - Not Applicable
References (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg24037783 - (CONFIRM) http://www.ibm.com/support/docview.wss?uid=swg24037783 - Third Party Advisory
References (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676419 - (CONFIRM) http://www-01.ibm.com/support/docview.wss?uid=swg21676419 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/59721 - (SECUNIA) http://secunia.com/advisories/59721 - Not Applicable
References (SECUNIA) http://secunia.com/advisories/59450 - (SECUNIA) http://secunia.com/advisories/59450 - Not Applicable
First Time Fedoraproject
Fedoraproject fedora
Suse linux Enterprise Server
Mariadb
Mariadb mariadb
Suse linux Enterprise Software Development Kit
Suse linux Enterprise Desktop
Suse
Suse linux Enterprise Workstation Extension
CPE cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*

Information

Published : 2014-04-14 22:38

Updated : 2023-12-10 11:31


NVD link : CVE-2010-5298

Mitre link : CVE-2010-5298

CVE.ORG link : CVE-2010-5298


JSON object : View

Products Affected

mariadb

  • mariadb

fedoraproject

  • fedora

openssl

  • openssl

suse

  • linux_enterprise_server
  • linux_enterprise_workstation_extension
  • linux_enterprise_desktop
  • linux_enterprise_software_development_kit
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')