Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 29 May 2013 19:32:51 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Subject: GnuTLS 2.x Lucky13 fix regression CVE-2013-2116

Hi!

This upstream gnutls-devel list thread points out an OOB read bug
introduced via the Lucky13 / CVE-2013-1619 fix for GnuTLS 2.x.

http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/6753

This possibly allows crashing TLS servers using GnuTLS remotely.
Upstream version 2.12.23 and vendor versions with 2.x patch backported
should be affected.  Upstream 3.x versions used different patch not
affected by this issue.

CVE-2013-2116 was assigned to this issue.

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.