[openssl-dev] Which patch to address CVE-2015-1788 in 0.9.8zg, 1.0.0s?

Albert Chin openssl-dev at mlists.thewrittenword.com
Wed Jun 24 15:56:23 UTC 2015


What patchset was used to address CVE-2015-1788 in 1.0.0s and 0.9.8zg?
In the 1.0.1 branch, it's very clear:
  commit f61bbf8da532038ed0eae16a9a11771f3da22d30
  Author: Andy Polyakov <appro at openssl.org>
  Date:   Thu Jun 11 00:18:01 2015 +0200

      bn/bn_gf2m.c: avoid infinite loop wich malformed ECParamters.

      CVE-2015-1788

      Reviewed-by: Matt Caswell <matt at openssl.org>
      (cherry picked from commit

The CHANGES file in 1.0.0s and 0.9.8zg states:
  *) Malformed ECParameters causes infinite loop

     When processing an ECParameters structure OpenSSL enters an infinite loop
     if the curve specified is over a specially malformed binary polynomial
     field.

     This can be used to perform denial of service against any
     system which processes public keys, certificate requests or
     certificates.  This includes TLS clients and TLS servers with
     client authentication enabled.

     This issue was reported to OpenSSL by Joseph Barr-Pixton.
     (CVE-2015-1788)
     [Andy Polyakov]

-- 
albert chin (china at thewrittenword.com)


More information about the openssl-dev mailing list