diff options
author | tb <> | 2020-12-08 15:08:47 +0000 |
---|---|---|
committer | tb <> | 2020-12-08 15:08:47 +0000 |
commit | 7708b34c3988d3cd2e01b8bd5d4f1a64461e6464 (patch) | |
tree | 04d30b19586f2c165be5347140b51a43e96bb77e /src/regress | |
parent | 60f8d5f04f496cfc73e2ea368f65d62714be33fc (diff) | |
download | openbsd-7708b34c3988d3cd2e01b8bd5d4f1a64461e6464.tar.gz openbsd-7708b34c3988d3cd2e01b8bd5d4f1a64461e6464.tar.bz2 openbsd-7708b34c3988d3cd2e01b8bd5d4f1a64461e6464.zip |
Fix a NULL dereference in GENERAL_NAME_cmp()libressl-v3.2.3
Comparing two GENERAL_NAME structures containing an EDIPARTYNAME can lead
to a crash. This enables a denial of service attack for an attacker who can
control both sides of the comparison.
Issue reported to OpenSSL on Nov 9 by David Benjamin.
OpenSSL shared the information with us on Dec 1st.
Fix from Matt Caswell (OpenSSL) with a few small tweaks.
ok jsing
this is errata/6.8/008_asn1.patch.sig
Diffstat (limited to 'src/regress')
0 files changed, 0 insertions, 0 deletions