what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2012-045

Mandriva Linux Security Advisory 2012-045
Posted Mar 30, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-045 - Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service via a large SessionTicket. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2011-4128
SHA-256 | 9d3027f3aebc071f3740544e88a82db2c4435c748db9687f95fffe022c747c8e

Mandriva Linux Security Advisory 2012-045

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:045
http://www.mandriva.com/security/
_______________________________________________________________________

Package : gnutls
Date : March 30, 2012
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in GnuTLS:

Buffer overflow in the gnutls_session_get_data function in
lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before
3.0.7, when used on a client that performs nonstandard session
resumption, allows remote TLS servers to cause a denial of service
(application crash) via a large SessionTicket (CVE-2011-4128).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4128
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.1:
2bfd265514dab79f39f776dbd582df72 2010.1/i586/gnutls-2.8.6-1.2mdv2010.2.i586.rpm
62167460d1ac31b2e7d54bc0a5f98ab5 2010.1/i586/libgnutls26-2.8.6-1.2mdv2010.2.i586.rpm
043750d56eb108f763317746ce920a85 2010.1/i586/libgnutls-devel-2.8.6-1.2mdv2010.2.i586.rpm
13ee1e088f22ffabfe82b81e00f9e799 2010.1/SRPMS/gnutls-2.8.6-1.2mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
6b57aa2034c33232fe12b1b2953e242c 2010.1/x86_64/gnutls-2.8.6-1.2mdv2010.2.x86_64.rpm
b2303b9b8dbff9a4755c561f601813f4 2010.1/x86_64/lib64gnutls26-2.8.6-1.2mdv2010.2.x86_64.rpm
af7670014b92577273944140cabe1b6f 2010.1/x86_64/lib64gnutls-devel-2.8.6-1.2mdv2010.2.x86_64.rpm
13ee1e088f22ffabfe82b81e00f9e799 2010.1/SRPMS/gnutls-2.8.6-1.2mdv2010.2.src.rpm

Mandriva Linux 2011:
6bb123df1f3176c25bb16105dc4fe7f3 2011/i586/gnutls-2.12.8-0.2-mdv2011.0.i586.rpm
23136ce1d38388653c690920c3baeb52 2011/i586/libgnutls26-2.12.8-0.2-mdv2011.0.i586.rpm
7561fb656d238acc33c6b61f20ddc8e9 2011/i586/libgnutls-devel-2.12.8-0.2-mdv2011.0.i586.rpm
5c0d0353c2ae4ec477b85d0194bf5872 2011/i586/libgnutls-ssl27-2.12.8-0.2-mdv2011.0.i586.rpm
41e127901e9fe3e84bf5ead8096c1665 2011/SRPMS/gnutls-2.12.8-0.2.src.rpm

Mandriva Linux 2011/X86_64:
bdd5be3403f8530f39f97ce90bad898e 2011/x86_64/gnutls-2.12.8-0.2-mdv2011.0.x86_64.rpm
51e3ada87157880774baab204af5a743 2011/x86_64/lib64gnutls26-2.12.8-0.2-mdv2011.0.x86_64.rpm
51b6cbff72d89135a680da20cf5df143 2011/x86_64/lib64gnutls-devel-2.12.8-0.2-mdv2011.0.x86_64.rpm
4f9a99872bdd82fe2a2b597ea32d70af 2011/x86_64/lib64gnutls-ssl27-2.12.8-0.2-mdv2011.0.x86_64.rpm
41e127901e9fe3e84bf5ead8096c1665 2011/SRPMS/gnutls-2.12.8-0.2.src.rpm

Mandriva Enterprise Server 5:
c662a0d8e022c7db282e577eac367ccd mes5/i586/gnutls-2.4.1-2.7mdvmes5.2.i586.rpm
ee9687cbb56d4a6520d3144ec6a317a3 mes5/i586/libgnutls26-2.4.1-2.7mdvmes5.2.i586.rpm
342295e2fe6f1ec99890d08ec280b004 mes5/i586/libgnutls-devel-2.4.1-2.7mdvmes5.2.i586.rpm
e00df4c4bf35636194532f0b4a900901 mes5/SRPMS/gnutls-2.4.1-2.7mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
29fa0ac0deb42e8e6c6b947487ef323f mes5/x86_64/gnutls-2.4.1-2.7mdvmes5.2.x86_64.rpm
21539a631a3cdb64e47537709524f5eb mes5/x86_64/lib64gnutls26-2.4.1-2.7mdvmes5.2.x86_64.rpm
1da550d6eb22b8014359eaa80be49ed1 mes5/x86_64/lib64gnutls-devel-2.4.1-2.7mdvmes5.2.x86_64.rpm
e00df4c4bf35636194532f0b4a900901 mes5/SRPMS/gnutls-2.4.1-2.7mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPdbT3mqjQ0CJFipgRAmu6AJ9KTkzBqPT1sq5MDRmXrcmcj1pZrACfWAHC
JxJv5MUBpjjzq7IaZpWm/8E=
=EiVf
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close