Mr. Hornik has discovered error in X.509 certificate chain verification procedure in GnuTLS library. The certificate chain should be verified from last root certificate to the first certificate. Otherwise a lot of unauthorized CPU processing can be forced to check certificate signatures signed with arbitrary RSA/DSA keys chosen by attacker. In GnuTLS the signatures are checked from first to last certificate, there is no limit on size of keys and no limit on length of certificate chain.
Alastair please bump to 1.0.17
bumped it in portage. although not stable yet.
OpenCDK dep should be app-crypt/opencdk-0.5.5
you are totally correct. its now fixed with the new opencdk committed.
Required keywords for security update : "alpha amd64 hppa ia64 mips ppc ppc64 sparc x86" Arches: please test and mark stable.
Decreasing priority, as this is not a very important security issue.
sparc stable!
Stable on alpha.
Stable on amd64.
stable on ppc
luca, opencdk 0.5.5 also needs to be marked stable for gnutls 1.0.17
stable on ia64
oops .. i didn't know that x86 was on the list
Ready for a GLSA decision. Given the vulnerability profile, I would vote for "no". hppa, mips, ppc64 : don't forget to mark stable in any case.
I vote for no GLSA on this one.
Done on hppa.
ppc should be ok
Closing without GLSA mips and ppc64 remember to markstable.
stable on mips
stable on ppc64