Bug 922498 (CVE-2015-0208) - VUL-1: CVE-2015-0208: openssl: [1.0.2 only] Segmentation fault for invalid PSS parameters
Summary: VUL-1: CVE-2015-0208: openssl: [1.0.2 only] Segmentation fault for invalid PS...
Status: RESOLVED UPSTREAM
Alias: CVE-2015-0208
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-16 10:57 UTC by Marcus Meissner
Modified: 2015-03-19 14:11 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Vítězslav Čížek 2015-03-16 15:25:48 UTC
We don't ship openssl 1.0.2.
Comment 2 Swamp Workflow Management 2015-03-16 23:01:36 UTC
bugbot adjusting priority
Comment 3 Marcus Meissner 2015-03-19 14:11:12 UTC
http://openssl.org/news/secadv_20150319.txt

Segmentation fault for invalid PSS parameters (CVE-2015-0208)
=============================================================

Severity: Moderate

The signature verification routines will crash with a NULL pointer
dereference if presented with an ASN.1 signature using the RSA PSS
algorithm and invalid parameters. Since these routines are used to verify
certificate signature algorithms this can be used to crash any
certificate verification operation and exploited in a DoS attack. Any
application which performs certificate verification is vulnerable including
OpenSSL clients and servers which enable client authentication.

This issue affects OpenSSL version: 1.0.2

OpenSSL 1.0.2 users should upgrade to 1.0.2a

This issue was was reported to OpenSSL on 31st January 2015 by Brian Carpenter
and a fix developed by Stephen Henson of the OpenSSL development team.
Comment 4 Marcus Meissner 2015-03-19 14:11:33 UTC
only affected 1.0.2. which we do not ship yet