From the PolarSSL Security Advisory 2013-03 advisory: "A bug in the logic of the parsing of PEM encoded certificates in x509parse_crt() can result in an infinite loop, thus hogging processing power." A remote attacker could use this flaw to make a TLS/SSL server using PolarSSL consume an excessive amount of CPU. This issue was corrected in PolarSSL versions 1.1.7 and 1.2.8. (Versions prior to these are affected.) External References: https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-03
Created polarssl tracking bugs for this issue: Affects: fedora-all [bug 997770]
The patch included in the upstream advisory looks to be this commit: https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
polarssl-1.2.8-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
polarssl-1.2.8-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
polarssl-1.2.8-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.