Bug 3713 - Update Request: Updated gnutls to fix CVE-2011-4128: Possible buffer overflow/Denial of service
Summary: Update Request: Updated gnutls to fix CVE-2011-4128: Possible buffer overflow...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 1
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL: http://www.gnu.org/software/gnutls/se...
Whiteboard:
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2011-12-12 04:47 CET by Funda Wang
Modified: 2011-12-14 16:33 CET (History)
3 users (show)

See Also:
Source RPM: gnutls-2.10.5-2.1.mga1.src.rpm
CVE:
Status comment:


Attachments

Description Funda Wang 2011-12-12 04:47:55 CET
A vulnerability has been discovered and corrected in gnutls:

* The gnutls_session_get_data function in the GnuTLS library before
  3.0.6 or before 2.12.13 on the 2.12.x branch could overflow a
  too-short buffer parameter allocated by the caller. The test to avoid
  the buffer overflow was not working correctly (CVE-2011-4128).

The updated package has been patched to fix this issue, plus some other small fixes from upstream.
Comment 1 Dave Hodgins 2011-12-12 08:08:52 CET
Testing complete on i586 for the srpm
gnutls-2.10.5-2.1.mga1.src.rpm

No POC for the vulnerability, so just confirming
aria2c https://www.google.com/
works.

CC: (none) => davidwhodgins

Comment 2 claire robinson 2011-12-14 14:33:12 CET
The following 3 packages are going to be installed:

- gnutls-2.10.5-2.1.mga1.x86_64
- lib64gnutls-devel-2.10.5-2.1.mga1.x86_64
- lib64gnutls26-2.10.5-2.1.mga1.x86_64


$ aria2c https://www.google.com

Status Legend:
 (OK):download completed.


Testing complete x86_64.


Advisory
===============
A vulnerability has been discovered and corrected in gnutls:

* The gnutls_session_get_data function in the GnuTLS library before
  3.0.6 or before 2.12.13 on the 2.12.x branch could overflow a
  too-short buffer parameter allocated by the caller. The test to avoid
  the buffer overflow was not working correctly (CVE-2011-4128).

The updated package has been patched to fix this issue, plus some other small
fixes from upstream.
===============

SRPM: gnutls-2.10.5-2.1.mga1.src.rpm


Could sysadmin please push from core/updates_testing to core/updates

Thankyou!

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 3 Thomas Backlund 2011-12-14 16:33:59 CET
Update pushed.

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.