USN-1418-1: GnuTLS vulnerabilities

Publication date

5 April 2012

Overview

The GnuTLS library could be made to crash under certain conditions.


Packages

  • gnutls13 - the GNU TLS library - commandline utilities
  • gnutls26 - the GNU TLS library - commandline utilities

Details

Alban Crequy discovered that the GnuTLS library incorrectly checked array
bounds when copying TLS session data. A remote attacker could crash a client
application, leading to a denial of service, as the client application prepared
for TLS session resumption. (CVE-2011-4128)

Matthew Hall discovered that the GnuTLS library incorrectly handled TLS
records. A remote attacker could crash client and server applications, leading
to a denial of service, by sending a crafted TLS record. (CVE-2012-1573)

Alban Crequy discovered that the GnuTLS library incorrectly checked array
bounds when copying TLS session data. A remote attacker could crash a client
application, leading to a denial of service, as the client application prepared
for TLS session resumption. (CVE-2011-4128)

Matthew Hall discovered that the GnuTLS library incorrectly handled TLS
records. A remote attacker could crash client and server applications, leading
to a denial of service, by sending a crafted TLS record. (CVE-2012-1573)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
8.04 hardy libgnutls13 –  2.0.4-1ubuntu2.7
11.10 oneiric libgnutls26 –  2.10.5-1ubuntu3.1
11.04 natty libgnutls26 –  2.8.6-1ubuntu2.1
10.10 maverick libgnutls26 –  2.8.6-1ubuntu0.1
10.04 lucid libgnutls26 –  2.8.5-2ubuntu0.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›