Unrated severityNVD Advisory· Published Apr 14, 2014· Updated May 6, 2026
CVE-2010-5298
CVE-2010-5298
Description
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
Affected products
8cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
82- ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.signvdPatchThird Party Advisory
- openwall.com/lists/oss-security/2014/04/13/1nvdMailing ListPatch
- advisories.mageia.org/MGASA-2014-0187.htmlnvdThird Party Advisory
- kb.juniper.net/InfoCenter/indexnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.htmlnvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- seclists.org/fulldisclosure/2014/Dec/23nvdMailing ListThird Party Advisory
- security.gentoo.org/glsa/glsa-201407-05.xmlnvdThird Party Advisory
- support.citrix.com/article/CTX140876nvdThird Party Advisory
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-opensslnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www.fortiguard.com/advisory/FG-IR-14-018/nvdThird Party Advisory
- www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmnvdThird Party Advisory
- www.ibm.com/support/docview.wssnvdThird Party Advisory
- www.ibm.com/support/docview.wssnvdThird Party Advisory
- www.openbsd.org/errata55.htmlnvdThird Party Advisory
- www.openssl.org/news/secadv_20140605.txtnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/534161/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/66801nvdThird Party AdvisoryVDB Entry
- www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reusenvdThird Party Advisory
- www.vmware.com/security/advisories/VMSA-2014-0006.htmlnvdThird Party Advisory
- www.vmware.com/security/advisories/VMSA-2014-0012.htmlnvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- www.novell.com/support/kb/doc.phpnvdThird Party Advisory
- kb.juniper.net/InfoCenter/indexnvdPermissions Required
- secunia.com/advisories/58337nvdNot Applicable
- secunia.com/advisories/58713nvdNot Applicable
- secunia.com/advisories/58939nvdNot Applicable
- secunia.com/advisories/58977nvdNot Applicable
- secunia.com/advisories/59162nvdNot Applicable
- secunia.com/advisories/59287nvdNot Applicable
- secunia.com/advisories/59300nvdNot Applicable
- secunia.com/advisories/59301nvdNot Applicable
- secunia.com/advisories/59342nvdNot Applicable
- secunia.com/advisories/59413nvdNot Applicable
- secunia.com/advisories/59437nvdNot Applicable
- secunia.com/advisories/59438nvdNot Applicable
- secunia.com/advisories/59440nvdNot Applicable
- secunia.com/advisories/59450nvdNot Applicable
- secunia.com/advisories/59490nvdNot Applicable
- secunia.com/advisories/59655nvdNot Applicable
- secunia.com/advisories/59666nvdNot Applicable
- secunia.com/advisories/59669nvdNot Applicable
- secunia.com/advisories/59721nvdNot Applicable
- svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.cnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www-947.ibm.com/support/entry/portal/docdisplaynvdBroken Link
- www-947.ibm.com/support/entry/portal/docdisplaynvdBroken Link
- www-947.ibm.com/support/entry/portal/docdisplaynvdBroken Link
- www-947.ibm.com/support/entry/portal/docdisplaynvdBroken Link
- www.blackberry.com/btsc/KB36051nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- kb.bluecoat.com/indexnvdBroken Link
- kc.mcafee.com/corporate/indexnvdBroken Link
- rt.openssl.org/Ticket/Display.htmlnvdBroken Link
- rt.openssl.org/Ticket/Display.htmlnvdBroken Link
News mentions
0No linked articles in our index yet.