[openssl-dev] Which patch to address CVE-2015-1788 in 0.9.8zg, 1.0.0s?
Albert Chin
openssl-dev at mlists.thewrittenword.com
Wed Jun 24 15:56:23 UTC 2015
What patchset was used to address CVE-2015-1788 in 1.0.0s and 0.9.8zg?
In the 1.0.1 branch, it's very clear:
commit f61bbf8da532038ed0eae16a9a11771f3da22d30
Author: Andy Polyakov <appro at openssl.org>
Date: Thu Jun 11 00:18:01 2015 +0200
bn/bn_gf2m.c: avoid infinite loop wich malformed ECParamters.
CVE-2015-1788
Reviewed-by: Matt Caswell <matt at openssl.org>
(cherry picked from commit
The CHANGES file in 1.0.0s and 0.9.8zg states:
*) Malformed ECParameters causes infinite loop
When processing an ECParameters structure OpenSSL enters an infinite loop
if the curve specified is over a specially malformed binary polynomial
field.
This can be used to perform denial of service against any
system which processes public keys, certificate requests or
certificates. This includes TLS clients and TLS servers with
client authentication enabled.
This issue was reported to OpenSSL by Joseph Barr-Pixton.
(CVE-2015-1788)
[Andy Polyakov]
--
albert chin (china at thewrittenword.com)
More information about the openssl-dev
mailing list