Summary: | dev-ruby/bouncy-castle-java: TLS CBC padding timing attack (CVE-2013-1624) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | java, proxy-maint, ruby, treecleaner |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=907589 | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2013-02-05 09:32:01 UTC
CVE-2013-1624 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1624): The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169. @maintainers: Please bump version or lastrite the package if it is no longer maintained. This package has been masked since 03 May 2014 as part of a general dev-java/jruby mask. @maintainers, please bump. One rdep dev-ruby/jruby-openssl. dev-ruby/jruby-openssl has no rdeps so both are a candidate for tree cleaning. dev-ruby/jruby-openssl may as well go at this point or at least get masked as jruby itself is masked and no one has time to work on it right now. Packages already masked. Sending last rites to lists. # Tom Wijsman <TomWij@gentoo.org> (03 May 2014) # Needs to be further tested and revised by both Java and Ruby herds. dev-ruby/bouncy-castle-java dev-ruby/jruby-openssl |