diff options
author | tb <> | 2020-12-08 15:08:47 +0000 |
---|---|---|
committer | tb <> | 2020-12-08 15:08:47 +0000 |
commit | 267ac14fa6781b6553b05a6d8dcdf99eaacc0edf (patch) | |
tree | 04d30b19586f2c165be5347140b51a43e96bb77e /src/lib/libssl/ssl_both.c | |
parent | ede7983d76de701a5269bb2be80a23f8da520e42 (diff) | |
download | openbsd-267ac14fa6781b6553b05a6d8dcdf99eaacc0edf.tar.gz openbsd-267ac14fa6781b6553b05a6d8dcdf99eaacc0edf.tar.bz2 openbsd-267ac14fa6781b6553b05a6d8dcdf99eaacc0edf.zip |
Fix a NULL dereference in GENERAL_NAME_cmp()libressl-v3.2.3
Comparing two GENERAL_NAME structures containing an EDIPARTYNAME can lead
to a crash. This enables a denial of service attack for an attacker who can
control both sides of the comparison.
Issue reported to OpenSSL on Nov 9 by David Benjamin.
OpenSSL shared the information with us on Dec 1st.
Fix from Matt Caswell (OpenSSL) with a few small tweaks.
ok jsing
this is errata/6.8/008_asn1.patch.sig
Diffstat (limited to 'src/lib/libssl/ssl_both.c')
0 files changed, 0 insertions, 0 deletions