|
Message-ID: <4BB385CE.5060208@redhat.com> Date: Wed, 31 Mar 2010 19:26:38 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com>, Jan Lehnardt <jan@...che.org> Subject: CVE Request -- Apache CouchDB v.0.11.0 -- timing attacks flaw Hi Steve, vendors, Apache CouchDB upstream has released latest, v.0.11.0 version, addressing timing attack flaw(s). More from Bugtraq post: [1] http://seclists.org/bugtraq/2010/Mar/254 "Apache CouchDB versions prior to version 0.11.0 are vulnerable to timing attacks, also known as side-channel information leakage, due to using simple break-on-inequality string comparisons when verifying hashes and passwords." References: [2] http://wiki.apache.org/couchdb/Breaking_changes [3] http://codahale.com/a-lesson-in-timing-attacks/ [4] http://couchdb.apache.org/ [5] http://couchdb.apache.org/downloads.html Credit: Jason Davies of the Apache CouchDB development team [1] references CVE-2008-2370 as CVE id, but CVE-2008-2370 is Apache Tomcat flaw: [6] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370 Since Apache CouchDB is different code base, susceptible to the same issue as in [3], assuming new CVE identifier is required. Steve, could you allocate one? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.