There is no test. That fix can be applied. 1.0.0 is really old and unsupported, you should upgrade as soon as possible -- Senior Architect, Akamai Technologies IM: richsalz at jabber.at Twitter: RichSalz From: siva gopi raju kudeti [mailto:sivagopi059@xxxxxxxxx] Sent: Thursday, August 11, 2016 6:18 AM To: openssl-users at openssl.org Subject: CVE-2016-2180 Hi OpenSSL team, I am using openssl-1.0.0e in my product. Here i want to know that OpenSSL is CVE-2016-2180 vulnerable or not. https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a?diff=unified<https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_openssl_openssl_commit_0ed26acce328ec16a3aa635f1ca37365e8c7403a-3Fdiff-3Dunified&d=DQMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=4LM0GbR0h9Fvx86FtsKI-w&m=in2joLu6jqlNBitsxFg73ZYSusePN_RJE6MXrjGwKJg&s=W9JT-cCKBKFVciZY8f7i6G3Z_47-U5_cKWMHpuEeekE&e=> In this page showing some modifications to the function TS_OBJ_print_bio. Is these changes are fix this vulnerability? Here i don't know how to test this vulnerability. Can you please provide me with the test process or ant other information about this vulnerability to go further. I will wait for your reply. best regards, Gopi. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20160811/b6a74251/attachment.html>