The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.
Created attachment 114036 [details] Upstream patch for this issue
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-430.html
This is also known as GNUTLS-SA-2005-1, upstream commit is: http://git.savannah.gnu.org/cgit/gnutls.git/commit/?id=7ad61625