Description
The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-456-1 | openssl security update |
Debian DSA |
DSA-3566-1 | openssl security update |
Ubuntu USN |
USN-2959-1 | OpenSSL vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Google
Subscribe
Android
Subscribe
Hp
Subscribe
Helion Openstack
Subscribe
Nodejs
Subscribe
Node.js
Subscribe
Openssl
Subscribe
Openssl
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Opensuse
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Hpc Node
Subscribe
Enterprise Linux Hpc Node Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Workstation
Subscribe
Jboss Core Services
Subscribe
Rhel Eus
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T23:17:50.633Z
Reserved: 2016-01-29T00:00:00.000Z
Link: CVE-2016-2107
No data.
Status : Deferred
Published: 2016-05-05T01:59:03.200
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-2107
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN