[openssl-dev] Which patch to address CVE-2015-1788 in 0.9.8zg, 1.0.0s?
Albert Chin
openssl-dev at mlists.thewrittenword.com
Wed Jun 24 16:59:15 UTC 2015
On Wed, Jun 24, 2015 at 05:14:53PM +0100, Matt Caswell wrote:
> On 24/06/15 16:56, Albert Chin wrote:
> > What patchset was used to address CVE-2015-1788 in 1.0.0s and 0.9.8zg?
> > In the 1.0.1 branch, it's very clear:
> > commit f61bbf8da532038ed0eae16a9a11771f3da22d30
> > Author: Andy Polyakov <appro at openssl.org>
> > Date: Thu Jun 11 00:18:01 2015 +0200
> >
> > bn/bn_gf2m.c: avoid infinite loop wich malformed ECParamters.
> >
> > CVE-2015-1788
> >
> > Reviewed-by: Matt Caswell <matt at openssl.org>
> > (cherry picked from commit
> >
> > The CHANGES file in 1.0.0s and 0.9.8zg states:
> > *) Malformed ECParameters causes infinite loop
> >
> > When processing an ECParameters structure OpenSSL enters an infinite loop
> > if the curve specified is over a specially malformed binary polynomial
> > field.
> >
> > This can be used to perform denial of service against any
> > system which processes public keys, certificate requests or
> > certificates. This includes TLS clients and TLS servers with
> > client authentication enabled.
> >
> > This issue was reported to OpenSSL by Joseph Barr-Pixton.
> > (CVE-2015-1788)
> > [Andy Polyakov]
>
> That's an error. It should not be in the CHANGES file because no
> change was made in the latest release. From the security advisory:
>
> "This issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent 1.0.0
> and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are
> affected.
Ok, thanks.
--
albert chin (china at thewrittenword.com)
More information about the openssl-dev
mailing list