What patchset was used to address CVE-2015-1788 in 1.0.0s and 0.9.8zg?
In the 1.0.1 branch, it's very clear:
  commit f61bbf8da532038ed0eae16a9a11771f3da22d30
  Author: Andy Polyakov <ap...@openssl.org>
  Date:   Thu Jun 11 00:18:01 2015 +0200

      bn/bn_gf2m.c: avoid infinite loop wich malformed ECParamters.

      CVE-2015-1788

      Reviewed-by: Matt Caswell <m...@openssl.org>
      (cherry picked from commit

The CHANGES file in 1.0.0s and 0.9.8zg states:
  *) Malformed ECParameters causes infinite loop

     When processing an ECParameters structure OpenSSL enters an infinite loop
     if the curve specified is over a specially malformed binary polynomial
     field.

     This can be used to perform denial of service against any
     system which processes public keys, certificate requests or
     certificates.  This includes TLS clients and TLS servers with
     client authentication enabled.

     This issue was reported to OpenSSL by Joseph Barr-Pixton.
     (CVE-2015-1788)
     [Andy Polyakov]

-- 
albert chin (ch...@thewrittenword.com)
_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to