CVE-2011-4128
Publication date 8 December 2011
Last updated 24 July 2024
Ubuntu priority
Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.
Status
Package | Ubuntu Release | Status |
---|---|---|
gnutls13 | 11.10 oneiric | Not in release |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy |
Fixed 2.0.4-1ubuntu2.7
|
|
gnutls26 | 11.10 oneiric |
Fixed 2.10.5-1ubuntu3.1
|
11.04 natty |
Fixed 2.8.6-1ubuntu2.1
|
|
10.10 maverick |
Fixed 2.8.6-1ubuntu0.1
|
|
10.04 LTS lucid |
Fixed 2.8.5-2ubuntu0.1
|
|
8.04 LTS hardy | Not in release |
Notes
jdstrand
According to upstream, this is client side only and requires clients to be written in a certain undocumented way. Upstream searched for this and found no clients to be vulnerable.
Patch details
Package | Patch details |
---|---|
gnutls13 | |
gnutls26 |
References
Related Ubuntu Security Notices (USN)
- USN-1418-1
- GnuTLS vulnerabilities
- 5 April 2012