Bug 908423 (CVE-2013-1621)

Summary: CVE-2013-1621 polarssl: out-of-bounds comparison flaw leads to DoS
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: mads
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: polarssl 1.2.5 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-03-22 06:00:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 907982    
Bug Blocks: 907592    

Description Vincent Danen 2013-02-06 16:47:06 UTC
In addition to the fix for CVE-2013-0169, PolarSSL 1.2.5 corrects the following problem:

"PolarSSL ... The code does not sanity check padlen before running
the padding check, meaning that out-of-bounds comparisons may be
made" (a possible denial-of-service issue for some applications)

Comment 1 Vincent Danen 2013-02-06 16:50:57 UTC
Created polarssl tracking bugs for this issue

Affects: fedora-all [bug 907982]