Bug 908238 (CVE-2013-1619)
Summary: | CVE-2013-1619 gnutls: TLS CBC padding timing attack (lucky-13) | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||
Severity: | medium | Docs Contact: | |||||||
Priority: | medium | ||||||||
Version: | unspecified | CC: | erik-fedora, jorton, mike, rjones, tmraz | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | gnutls 2.12.23, gnutls 3.0.28, gnutls 3.1.7 | Doc Type: | Bug Fix | ||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2013-03-26 06:47:40 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 907983, 908418, 908419, 908441, 908443, 911072, 911073, 911076, 911077 | ||||||||
Bug Blocks: | 907592 | ||||||||
Attachments: |
|
Description
Huzaifa S. Sidhpurwala
2013-02-06 08:47:41 UTC
To clarify, this CVE is specifically for: "The GnuTLS implementation of MEE-TLS-CBC deals with bad padding in a different way to that recommended in the RFCs: instead of assuming zero-length padding, it uses the last byte of plaintext to determine how many plaintext bytes to remove (whether or not those bytes are correctly formatted padding). ... This indicates that ignoring the recommendations of the RFCs can have severe security consequences." Which is not quite the same as that described in comment #0 (that description is for CVE-2013-0169 which also affects GnuTLS). Sorry, as per: http://www.openwall.com/lists/oss-security/2013/02/06/1 CVE-2013-0169 does _not_ affect GnuTLS. Created mingw32-gnutls tracking bugs for this issue Affects: fedora-16 [bug 908418] Affects: epel-5 [bug 908419] Created mingw-gnutls tracking bugs for this issue Affects: fedora-17 [bug 908441] Created mingw-gnutls tracking bugs for this issue Affects: fedora-18 [bug 908443] Created attachment 694893 [details]
gnutls 2.12.20 patch1
The provided patches for 2.12.x do not apply against 2.12.20 (Fedora 17). I have modified them to apply.
Created attachment 694894 [details]
gnutls 2.12.20 patch2
Write up from Nikos Mavrogiannopoulos, one of the GnuTLS authors: http://nmav.gnutls.org/2013/02/time-is-money-for-cbc-ciphersuites.html mingw-gnutls-2.12.22-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. mingw-gnutls-2.12.20-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2013:0588 https://rhn.redhat.com/errata/RHSA-2013-0588.html gnutls-2.12.23-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. libtasn1-2.14-1.fc17, gnutls-2.12.23-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: RHEV-H and Agents for RHEL-6 Via RHSA-2013:0636 https://rhn.redhat.com/errata/RHSA-2013-0636.html |