Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 471788 (CVE-2013-2116) - <net-libs/gnutls-2.12.23-r1 : TLS Record Decoding Denial of Service Vulnerability (CVE-2013-2116)
Summary: <net-libs/gnutls-2.12.23-r1 : TLS Record Decoding Denial of Service Vulnerabi...
Status: RESOLVED FIXED
Alias: CVE-2013-2116
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/53600/
Whiteboard: A3 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-05-30 09:12 UTC by Agostino Sarubbo
Modified: 2013-10-28 11:53 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-05-30 09:12:38 UTC
From ${URL} :

Description
A vulnerability has been reported in GnuTLS, which can be exploited by 
malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an out-of-bounds read error within 
the "_gnutls_ciphertext2compressed()" function in lib/gnutls_cipher.c 
and can be exploited to cause a crash of the application using the 
library.

The vulnerability is reported in version 2.12.23.


Solution
Fixed in the git repository.

Provided and/or discovered by
Andreas Metzler

Original Advisory
GNUTLS-SA-2013-2:
http://www.gnutls.org/security.html#GNUTLS-SA-2013-2

Andreas Metzler:
http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/6753



@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Tim Harder gentoo-dev 2013-05-30 20:01:17 UTC
Arches, please test and stabilize:
=net-libs/gnutls-2.12.23-r1
Comment 2 Tobias Klausmann (RETIRED) gentoo-dev 2013-05-31 15:00:10 UTC
Stable on alpha.
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2013-05-31 16:31:44 UTC
Stable for HPPA.
Comment 4 Tomáš "tpruzina" Pružina (amd64 [ex]AT) 2013-06-02 14:30:06 UTC
=net-libs/gnutls-2.12.23-r1
amd64: ok (I have given up on FEATURES=test as these took too long to complete)
Comment 5 Richard Freeman gentoo-dev 2013-06-02 20:43:45 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2013-06-04 12:27:36 UTC
x86 stable
Comment 7 Markus Meier gentoo-dev 2013-06-09 09:26:35 UTC
arm stable
Comment 8 Agostino Sarubbo gentoo-dev 2013-06-09 11:36:18 UTC
ia64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2013-06-09 11:36:39 UTC
ppc stable
Comment 10 Agostino Sarubbo gentoo-dev 2013-06-09 11:37:02 UTC
sparc stable
Comment 11 Agostino Sarubbo gentoo-dev 2013-06-09 12:11:55 UTC
ppc64 stable
Comment 12 Agostino Sarubbo gentoo-dev 2013-06-09 12:14:18 UTC
s390 stable
Comment 13 Agostino Sarubbo gentoo-dev 2013-06-11 11:05:30 UTC
sh stable
Comment 14 GLSAMaker/CVETool Bot gentoo-dev 2013-08-31 18:44:30 UTC
CVE-2013-2116 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2116):
  The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS
  2.12.23 allows remote attackers to cause a denial of service (buffer
  over-read and crash) via a crafted padding length.  NOTE: this might be due
  to an incorrect fix for CVE-2013-0169.
Comment 15 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-03 17:02:02 UTC
Added to existing GLSA draft. Waiting for m68k, then cleanup.
Comment 16 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-22 19:16:02 UTC
m68k -> ~ only. Cleaned up in another bug. Ready for GLSA.
Comment 17 Alon Bar-Lev (RETIRED) gentoo-dev 2013-10-22 17:12:06 UTC
crypto done
Comment 18 GLSAMaker/CVETool Bot gentoo-dev 2013-10-28 11:53:29 UTC
This issue was resolved and addressed in
 GLSA 201310-18 at http://security.gentoo.org/glsa/glsa-201310-18.xml
by GLSA coordinator Sergey Popov (pinkbyte).