diff options
author | Jack Lloyd <[email protected]> | 2017-04-04 15:45:42 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2017-04-04 15:45:42 -0400 |
commit | 92f3ff5e27f6736d8a498e0d3144255c4ba37c8d (patch) | |
tree | c61436699e5afb8de2e8c3b7874c2040ec195263 /doc/security.rst | |
parent | d4c3f6a3409ce0ad6520c13813310f6cb523fe6f (diff) |
Fix X509 DN comparisons
CVE-2017-2801
Diffstat (limited to 'doc/security.rst')
-rw-r--r-- | doc/security.rst | 13 |
1 files changed, 12 insertions, 1 deletions
diff --git a/doc/security.rst b/doc/security.rst index 9ed29ef03..9d08ed8c8 100644 --- a/doc/security.rst +++ b/doc/security.rst @@ -18,7 +18,18 @@ https://keybase.io/jacklloyd and on most PGP keyservers. 2017 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -* 2017-03-23 (CVE-2016-7252): Incorrect bcrypt computation +* 2017-04-04 (CVE-2017-2801): Incorrect comparison in X.509 DN strings + + Botan's implementation of X.509 name comparisons had a flaw which + could result in an out of bound memory read while processing a + specially formed DN. This could potentially be exploited for + information disclosure or denial of service, or result in incorrect + validation results. Found independently by Aleksandar Nikolic of + Cisco Talos, and OSS-Fuzz automated fuzzing infrastructure. + + Bug introduced in 1.6.0 or earlier, fixed in 2.1.0 and 1.10.16 + +* 2017-03-23 (CVE-2017-7252): Incorrect bcrypt computation Botan's implementation of bcrypt password hashing scheme truncated long passwords at 56 characters, instead of at bcrypt's standard 72 characters |