Description
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
Remediation
References
Related Vulnerabilities
WordPress Plugin WP Humans.txt Cross-Site Scripting (1.0.6)
WordPress Plugin job-portal Cross-Site Scripting (0.0.1)
Plone CMS Server-Side Request Forgery (SSRF) Vulnerability (CVE-2020-28735)
WordPress Plugin TI WooCommerce Wishlist Security Bypass (1.21.11)
Plone CMS URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2017-1000484)