GnuTLS upstream recently fixed a bug, which seems to have emerged due to the fix implemented in CVE-2013-4466. Upstream recommends to update to GnuTLS 3.1.16 and 3.2.6. References: http://seclists.org/oss-sec/2013/q4/199 Commits: https://gitorious.org/gnutls/gnutls/commit/0dd5529509e46b11d5c0f3f26f99294e0e5fa6dc https://gitorious.org/gnutls/gnutls/commit/ad6a243b5ad219fda7511d4cbc1f73d77414db77
Created gnutls tracking bugs for this issue: Affects: fedora-all [bug 1025638]
This CVE is for an incorrect fix for CVE-2013-4466 (see bug 1022913). It contained an off-by-one error, causing it to possibly write 5 entries to 4 slot arrays in dane_query_st / dane_query_t. Problem is already mentioned in bug 1022913 comment 7. Acknowledment: This issue was discovered by Tomas Mraz of Red Hat.
Statement: Not vulnerable. This issue did not affect the versions of gnutls as shipped with Red Hat Enterprise Linux 5 and 6 as they did not include support for DANE protocol.
gnutls-3.1.16-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
gnutls-3.1.16-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.