{"id":"CVE-2011-4109","details":"Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.","modified":"2026-04-10T03:42:01.513483Z","published":"2012-01-06T01:55:00Z","related":["SUSE-SU-2015:1184-1","SUSE-SU-403","SUSE-SU-403 Forbidden-1"],"references":[{"type":"ADVISORY","url":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1306.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1307.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-1308.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/48528"},{"type":"ADVISORY","url":"http://www.debian.org/security/2012/dsa-2390"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:006"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:007"},{"type":"ADVISORY","url":"http://www.openssl.org/news/secadv_20120104.txt"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=132750648501816&w=2"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=134039053214295&w=2"},{"type":"WEB","url":"http://support.apple.com/kb/HT5784"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/737740"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72129"}],"schema_version":"1.7.5"}