Summary: | <net-libs/polarssl-1.2.8: Certificate Message Processing Denial of Service Vulnerability (CVE-2013-4623) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | tommy |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/54430/ | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Are we good to stable? (In reply to Chris Reffett from comment #1) > Are we good to stable? looks good for stable, so adding arches. please stabilize: =net-libs/polarssl-1.2.8 target keywords: amd64 arm hppa ppc ppc64 s390 sparc x86 ~amd64-fbsd ~x86-fbsd amd64 stable x86 stable Stable for HPPA. ppc stable ppc64 stable arm stable s390 stable sparc stable old version removed GLSA vote: yes As we already have draft for polarssl CVE-2013-4623 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4623): The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certificate. Added to existing GLSA draft This issue was resolved and addressed in GLSA 201310-10 at http://security.gentoo.org/glsa/glsa-201310-10.xml by GLSA coordinator Sergey Popov (pinkbyte). |