Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <520C45F0.6000703@redhat.com>
Date: Wed, 14 Aug 2013 21:07:28 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Oden Eriksson <oeriksson@...driva.com>
Subject: Re: CVE Request -- php - handling of certs with null
 bytes

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/14/2013 02:47 AM, Oden Eriksson wrote:
> Hello, A similar flaw as in ruby and python was discovered and
> fixed for php.
> 
> ruby - CVE-2013-4073 python - CVE-2013-4238 php - CVE-2013-????
> 
> http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/[1]
>
>  Upstream fixes:
> 
> http://git.php.net/?p=php-src.git;a=commit;h=dcea4ec698dcae39b7bba6f6aa08933cbfee6755[2]
>
>  
> http://git.php.net/?p=php-src.git;a=commit;h=2874696a5a8d46639d261571f915c493cd875897[3]
>
> 
> 
> _https://bugs.mageia.org/show_bug.cgi?id=10997_
> 
> Cheers.
> 
> -------- [1]
> http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
>
> 
[2]
http://git.php.net/?p=php-src.git;a=commit;h=dcea4ec698dcae39b7bba6f6aa08933cbfee6755
> [3]
> http://git.php.net/?p=php-src.git;a=commit;h=2874696a5a8d46639d261571f915c493cd875897
>
> 
Please use CVE-2013-4248 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
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=QgvB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.