Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 389947 (CVE-2011-4128) - <net-libs/gnutls-2.12.18: Possible buffer overflow/Denial of service (CVE-2011-4128)
Summary: <net-libs/gnutls-2.12.18: Possible buffer overflow/Denial of service (CVE-201...
Status: RESOLVED FIXED
Alias: CVE-2011-4128
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-11-09 10:41 UTC by Hanno Böck
Modified: 2012-06-23 14:41 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hanno Böck gentoo-dev 2011-11-09 10:41:56 UTC
See
http://www.gnu.org/s/gnutls/security.html

Fix only for 2.12 and 3.0. It seems gnutls upstream considers 2.10.x deprecated and provides no more security updates. So it's probably time to unmask latest gnutls versions in portage.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2011-12-13 00:33:08 UTC
CVE-2011-4128 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4128):
  Buffer overflow in the gnutls_session_get_data function in
  lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7,
  when used on a client that performs nonstandard session resumption, allows
  remote TLS servers to cause a denial of service (application crash) via a
  large SessionTicket.
Comment 2 Sean Amoss (RETIRED) gentoo-dev Security 2012-05-17 22:43:11 UTC
Added to existing GLSA request.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2012-06-23 14:41:25 UTC
This issue was resolved and addressed in
 GLSA 201206-18 at http://security.gentoo.org/glsa/glsa-201206-18.xml
by GLSA coordinator Sean Amoss (ackle).