==========================================================================
Ubuntu Security Notice USN-3318-1
June 13, 2017
gnutls26, gnutls28 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in GnuTLS.
Software Description:
– gnutls28: GNU TLS library
– gnutls26: GNU TLS library
Details:
Hubert Kario discovered that GnuTLS incorrectly handled decoding a status
response TLS extension. A remote attacker could possibly use this issue to
cause GnuTLS to crash, resulting in a denial of service. This issue only
applied to Ubuntu 16.04 LTS, Ubuntu 16.10 and Ubuntu 17.04. (CVE-2017-7507)
It was discovered that GnuTLS incorrectly handled decoding certain OpenPGP
certificates. A remote attacker could use this issue to cause GnuTLS to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2017-7869)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libgnutls30 3.5.6-4ubuntu4.1
Ubuntu 16.10:
libgnutls30 3.5.3-5ubuntu1.2
Ubuntu 16.04 LTS:
libgnutls30 3.4.10-4ubuntu1.3
Ubuntu 14.04 LTS:
libgnutls26 2.12.23-12ubuntu2.8
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3318-1
CVE-2017-7507, CVE-2017-7869
Package Information:
https://launchpad.net/ubuntu/+source/gnutls28/3.5.6-4ubuntu4.1
https://launchpad.net/ubuntu/+source/gnutls28/3.5.3-5ubuntu1.2
https://launchpad.net/ubuntu/+source/gnutls28/3.4.10-4ubuntu1.3
https://launchpad.net/ubuntu/+source/gnutls26/2.12.23-12ubuntu2.8
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAEBCgAGBQJZQB8MAAoJEGVp2FWnRL6TJJMP/2CQe9qg/rg3gY7qPYJdF/mZ
qY8Uoaugx+cLgBY/ejCQJKrS5C4A4x1ljk931NatP+HjGMx9rLnprBgRT6r1yU9D
7oeBd05nPci2bBmRa264yBE11vgdWOP5kByWh6IM/ZQ2m3QAo89r5UfV7S4LhY9v
qgVdF/lRFgpDM83tRga7+W9ZvS506U2mOgaIIDcckK6KfELiVN7SOahIVFzyKzym
wCnR+CtS17q/Bje0v9kP397zybqHcMuwlgkxil5ZKpyRTNastoJOSMkzvx+xJaGV
rFB/RvHZP6UWka3Vea63cORZH74kZ/+wdxNcT6XJ7Og/YV0LF6cjBFuRK2oL6A2s
oVzDBSzdHD7M6IJdUDol+Umyvwt/2cY7/u4uBiCeMkw5n//XOyu4AC4fKsYYcp/I
le8/eOaogZgQwd9mCPl0sr/udqRVh66ppnKF8Uazi+ZvdAFLiDlRvs4j21RJ3EIK
eIJ+IctcSWbYpRDGwz2kMBLwG8JWDfQCZE1jMKBS6boNu6njHXrEjq0egUKSRkKu
RrbOtHXmfg7Wax/ezRWA8kO594/ImwbaNn3ky7rdAmpoKYId4CZmQCxjYUOZ1MzU
4zjRxdrSA3m+za02mMdR16V+E27BvqoX9PJEz4jPZEVCwnHbtxm8h94pLaaoFXbZ
gk0wQhMuwfXyfooMEM3t
=fi85
—–END PGP SIGNATURE—–
—