Bug#648441: CVE-2011-4128: GNUTLS-SA-2011-2

Moritz Muehlenhoff muehlenhoff at univention.de
Fri Nov 11 15:10:44 UTC 2011


Package: gnutls26
Severity: important
Tags: security

Please see http://www.gnu.org/s/gnutls/security.html for details.

Fixes:
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=7fc8fa6464d305440fddab423079c76a915decc3
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=588708465992e1d9fc09cf4e3a39caef878428d9

Given the following inline documentation I would assume that this
could be triggered by a malicious server providing a service over
TLS to crash the client, but not the other way 'round. Is that correct?

/**                                                                                                                                                                                  * gnutls_session_get_data - Returns all session parameters.                                                                                                                        * @session: is a #gnutls_session_t structure.                                                                                                                                      * @session_data: is a pointer to space to hold the session.                                                                                                                        * @session_data_size: is the session_data's size, or it will be set by the function.                                                                                               *                                                                                            
                                                                                      
  * Returns all session parameters, in order to support resuming.  The                                                                                                               * client should call this, and keep the returned session, if he                                                                                                                    * wants to resume that current version later by calling                                                                                                                            * gnutls_session_set_data() This function must be called after a                                                                                                                   * successful handshake.                                                                                                                                                           
  *                                                                                                                                                                                  * Resuming sessions is really useful and speedups connections after                                                                                                                * a succesful one.                                                                                                                                                                 *                                                                                                                                                                                 
  * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise                                                                                                                *   an error code is returned.                                                                                                                                                     **/

Cheers,
        Moritz





More information about the Pkg-gnutls-maint mailing list