On Wed, Jun 24, 2015 at 05:14:53PM +0100, Matt Caswell wrote: > On 24/06/15 16:56, Albert Chin wrote: > > What patchset was used to address CVE-2015-1788 in 1.0.0s and 0.9.8zg? > > In the 1.0.1 branch, it's very clear: > > commit f61bbf8da532038ed0eae16a9a11771f3da22d30 > > Author: Andy Polyakov <[email protected]> > > Date: Thu Jun 11 00:18:01 2015 +0200 > > > > bn/bn_gf2m.c: avoid infinite loop wich malformed ECParamters. > > > > CVE-2015-1788 > > > > Reviewed-by: Matt Caswell <[email protected]> > > (cherry picked from commit > > > > The CHANGES file in 1.0.0s and 0.9.8zg states: > > *) Malformed ECParameters causes infinite loop > > > > When processing an ECParameters structure OpenSSL enters an infinite > > loop > > if the curve specified is over a specially malformed binary polynomial > > field. > > > > This can be used to perform denial of service against any > > system which processes public keys, certificate requests or > > certificates. This includes TLS clients and TLS servers with > > client authentication enabled. > > > > This issue was reported to OpenSSL by Joseph Barr-Pixton. > > (CVE-2015-1788) > > [Andy Polyakov] > > That's an error. It should not be in the CHANGES file because no > change was made in the latest release. From the security advisory: > > "This issue affects OpenSSL versions: 1.0.2 and 1.0.1. Recent 1.0.0 > and 0.9.8 versions are not affected. 1.0.0d and 0.9.8r and below are > affected.
Ok, thanks. -- albert chin ([email protected]) _______________________________________________ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
