Bug#648441: CVE-2011-4128: GNUTLS-SA-2011-2

Simon Josefsson simon at josefsson.org
Fri Nov 11 15:35:56 UTC 2011


fre 2011-11-11 klockan 16:10 +0100 skrev Moritz Muehlenhoff:
> Package: gnutls26
> Severity: important
> Tags: security
> 
> Please see http://www.gnu.org/s/gnutls/security.html for details.
> 
> Fixes:
> http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=7fc8fa6464d305440fddab423079c76a915decc3
> http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=588708465992e1d9fc09cf4e3a39caef878428d9
> 
> Given the following inline documentation I would assume that this
> could be triggered by a malicious server providing a service over
> TLS to crash the client, but not the other way 'round. Is that correct?

As far as I understand, the client also has to be written in a
vulnerable way.  The example code doesn't, and likely there are few
clients like that around.  More investigation is warranted...

/Simon

> 
> /**                                                                                                                                                                                  * gnutls_session_get_data - Returns all session parameters.                                                                                                                        * @session: is a #gnutls_session_t structure.                                                                                                                                      * @session_data: is a pointer to space to hold the session.                                                                                                                        * @session_data_size: is the session_data's size, or it will be set by the function.                                                                                               *                                                                                         !
    
>                                                                                       
>   * Returns all session parameters, in order to support resuming.  The                                                                                                               * client should call this, and keep the returned session, if he                                                                                                                    * wants to resume that current version later by calling                                                                                                                            * gnutls_session_set_data() This function must be called after a                                                                                                                   * successful handshake.                                                                                                                                                           
>   *                                                                                                                                                                                  * Resuming sessions is really useful and speedups connections after                                                                                                                * a succesful one.                                                                                                                                                                 *                                                                                                                                                                                 
>   * Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise                                                                                                                *   an error code is returned.                                                                                                                                                     **/
> 
> Cheers,
>         Moritz
> 
> 
> 







More information about the Pkg-gnutls-maint mailing list