What patchset was used to address CVE-2015-1788 in 1.0.0s and 0.9.8zg? In the 1.0.1 branch, it's very clear: commit f61bbf8da532038ed0eae16a9a11771f3da22d30 Author: Andy Polyakov <ap...@openssl.org> Date: Thu Jun 11 00:18:01 2015 +0200
bn/bn_gf2m.c: avoid infinite loop wich malformed ECParamters. CVE-2015-1788 Reviewed-by: Matt Caswell <m...@openssl.org> (cherry picked from commit The CHANGES file in 1.0.0s and 0.9.8zg states: *) Malformed ECParameters causes infinite loop When processing an ECParameters structure OpenSSL enters an infinite loop if the curve specified is over a specially malformed binary polynomial field. This can be used to perform denial of service against any system which processes public keys, certificate requests or certificates. This includes TLS clients and TLS servers with client authentication enabled. This issue was reported to OpenSSL by Joseph Barr-Pixton. (CVE-2015-1788) [Andy Polyakov] -- albert chin (ch...@thewrittenword.com) _______________________________________________ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev