CVE-2015-0288

Priority
Description
The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before
0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a
might allow attackers to cause a denial of service (NULL pointer
dereference and application crash) via an invalid certificate key.
Assigned-to
mdeslaur
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (1.0.1-4ubuntu5.25)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.0.1f-1ubuntu2.11)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.0.1f-1ubuntu11)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.0.1f-1ubuntu11)
Patches:
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=28a00bcd8e318da18031b2ac8778c64147cd54f9 (trunk)
Upstream:https://git.openssl.org/?p=openssl.git;a=commit;h=51527f1e3564f210e984fe5b654c45d34e4f03d7 (1.0.1)
Upstream:https://git.openssl.org/?p=openssl.git;a=commit;h=241cff623e2b0f7c435a3a80ae783c29d994f061 (0.9.8)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
More Information

Updated: 2020-07-28 19:53:25 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)