CVE-2011-4128
Publication date 8 December 2011
Last updated 24 July 2024
Ubuntu priority
Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.
Status
Package | Ubuntu Release | Status |
---|---|---|
gnutls13 | ||
gnutls26 | ||
Notes
jdstrand
According to upstream, this is client side only and requires clients to be written in a certain undocumented way. Upstream searched for this and found no clients to be vulnerable.
Patch details
Package | Patch details |
---|---|
gnutls13 | |
gnutls26 |
References
Related Ubuntu Security Notices (USN)
- USN-1418-1
- GnuTLS vulnerabilities
- 5 April 2012