Summary: | <net-libs/gnutls-3.6.7: multiple vulnerabilities (GNUTLS-SA-2019-03-27) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | alonbl, crypto+disabled |
Priority: | Normal | Keywords: | STABLEREQ |
Version: | unspecified | Flags: | stable-bot:
sanity-check+
|
Hardware: | All | ||
OS: | Linux | ||
URL: | https://lists.gnupg.org/pipermail/gnutls-help/2019-March/004497.html | ||
Whiteboard: | A2 [glsa+ cve stable] | ||
Package list: |
=net-libs/gnutls-3.6.7 alpha amd64 arm arm64 hppa ia64 ppc ppc64 s390 sparc x86
|
Runtime testing required: | --- |
Bug Depends on: | 677430, 681096 | ||
Bug Blocks: |
Description
GLSAMaker/CVETool Bot
![]() It was found using the TLS fuzzer tools that decoding a malformed TLS1.3 asynchronous message can cause a server crash via an invalid pointer access. The issue affects GnuTLS server applications since 3.6.4. The issue was reported in issue tracker as #704. Tavis Ormandy from Google Project Zero found a memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected. The issue was reported in issue tracker as #694. Recommendation: To address the issues found upgrade to GnuTLS 3.6.7 or later versions. I version bumped the gnutls, but the changes are not trivial, I suggest to wait about a week before stabilizing. Maintainer(s), please advise if you are ready for stabilization or call for stabilization yourself, when ready. Let's stabilize. amd64 stable x86 stable s390 stable arm stable sparc stable alpha stable alpha stable ia64 stable ppc64 stable ppc stable hppa stable This issue was resolved and addressed in GLSA 201904-14 at https://security.gentoo.org/glsa/201904-14 by GLSA coordinator Aaron Bauman (b-man). re-opened for final arches and cleanup. arm64 stable arm stable |