Packages
Details
Alban Crequy discovered that the GnuTLS library incorrectly checked array
bounds when copying TLS session data. A remote attacker could crash a client
application, leading to a denial of service, as the client application prepared
for TLS session resumption. (CVE-2011-4128)
Matthew Hall discovered that the GnuTLS library incorrectly handled TLS
records. A remote attacker could crash client and server applications, leading
to a denial of service, by sending a crafted TLS record. (CVE-2012-1573)
Alban Crequy discovered that the GnuTLS library incorrectly checked array
bounds when copying TLS session data. A remote attacker could crash a client
application, leading to a denial of service, as the client application prepared
for TLS session resumption. (CVE-2011-4128)
Matthew Hall discovered that the GnuTLS library incorrectly handled TLS
records. A remote attacker could crash client and server applications, leading
to a denial of service, by sending a crafted TLS record. (CVE-2012-1573)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
8.04 hardy | libgnutls13 – 2.0.4-1ubuntu2.7 | ||
11.10 oneiric | libgnutls26 – 2.10.5-1ubuntu3.1 | ||
11.04 natty | libgnutls26 – 2.8.6-1ubuntu2.1 | ||
10.10 maverick | libgnutls26 – 2.8.6-1ubuntu0.1 | ||
10.04 lucid | libgnutls26 – 2.8.5-2ubuntu0.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.