What patchset was used to address CVE-2015-1788 in 1.0.0s and 0.9.8zg?
In the 1.0.1 branch, it's very clear:
commit f61bbf8da532038ed0eae16a9a11771f3da22d30
Author: Andy Polyakov <[email protected]>
Date: Thu Jun 11 00:18:01 2015 +0200
bn/bn_gf2m.c: avoid infinite loop wich malformed ECParamters.
CVE-2015-1788
Reviewed-by: Matt Caswell <[email protected]>
(cherry picked from commit
The CHANGES file in 1.0.0s and 0.9.8zg states:
*) Malformed ECParameters causes infinite loop
When processing an ECParameters structure OpenSSL enters an infinite loop
if the curve specified is over a specially malformed binary polynomial
field.
This can be used to perform denial of service against any
system which processes public keys, certificate requests or
certificates. This includes TLS clients and TLS servers with
client authentication enabled.
This issue was reported to OpenSSL by Joseph Barr-Pixton.
(CVE-2015-1788)
[Andy Polyakov]
--
albert chin ([email protected])
_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev