libgnutls28 appears to not have been updated for CVE-2014-3466 in Trusty
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| | gnutls28 (Ubuntu) |
Critical
|
Unassigned | ||
Bug Description
Hi,
Although you've pushed out a patch for CVE-2014-3466 to libgnutls26 in the current stable LTS Ubuntu release (Trusty) you've not pushed out a corresponding patch for libgnutls28 (which is used by some packages).
Looking at the apt-cache policy output:
$ apt-cache policy libgnutls28
libgnutls28:
Installed: 3.2.11-2ubuntu1
Candidate: 3.2.11-2ubuntu1
Version table:
*** 3.2.11-2ubuntu1 0
500 http://
100 /var/lib/
This would look like a vulnerable version according to the CVE report (also launchpad shows this package as not having been updated since the 5th of March).
http://
Can you please push out this patch asap, especially given that the vulnerability has been widely publicised in the media as of yesterday?
Thanks,
Dr Owain Kenway
CVE References
| Marc Deslauriers (mdeslaur) wrote : | #1 |
| Changed in gnutls28 (Ubuntu): | |
| status: | New → Incomplete |
| information type: | Private Security → Public Security |
| tags: | added: trusty |
| Simon Arlott (sa.me.uk) wrote : | #2 |
There is a fix for this in the Debian version 3.2.15-2 of the package.
| Changed in gnutls28 (Ubuntu): | |
| status: | Incomplete → Confirmed |
It has a severe impact on a large portion of Ubuntu users.
| Changed in gnutls28 (Ubuntu): | |
| importance: | Undecided → Critical |
| Changed in gnutls28 (Ubuntu): | |
| status: | Confirmed → Triaged |
| tags: | added: amd64 |
test build ongoing on ppa:costamagnag
| Marc Deslauriers (mdeslaur) wrote : | #7 |
subscribing ubuntu-
https:/
| Tyler Hicks (tyhicks) wrote : | #8 |
Hi LocutusOfBorg - Thank you for the debdiff. I've made some adjustments to it in order to follow our security update packing guidelines (https:/
- Pocket should be trusty-security instead of trusty
- Version should be 3.2.11-2ubuntu1.1 instead of 3.2.11-2ubuntu2
- Patch was missing the DEP3 origin patch tag
- Changelog did not follow the "SECURITY UPDATE:" style
Additionally, I folded in upstream's test patch (https:/
Thanks!
| Changed in gnutls28 (Ubuntu): | |
| status: | Triaged → Confirmed |
Hi Tyler,
> - Pocket should be trusty-security instead of trusty
I remember Coling saying something about proposed mapped automatically to the release, I thought security was actually the same, but obviously not because they are not in the same pocket (bad me, I didn't think enough)
- Version should be 3.2.11-2ubuntu1.1 instead of 3.2.11-2ubuntu2
OOps, sorry I usually fix stuff in packages I maintain, bad me
- Patch was missing the DEP3 origin patch tag
yes, sorry
- Changelog did not follow the "SECURITY UPDATE:" style
this is something I'm trying to learn, but I forgot/I'm not able to do it correctly.
thanks a lot for the fixes and for caring!
| Tyler Hicks (tyhicks) wrote : | #10 |
No worries! I also prepared a 12.04 update since the patch is trivial. Packages are building now.
| Launchpad Janitor (janitor) wrote : | #11 |
This bug was fixed in the package gnutls28 - 3.0.11-1ubuntu2.1
---------------
gnutls28 (3.0.11-1ubuntu2.1) precise-security; urgency=medium
* SECURITY UPDATE: Denial of service and possible remote arbitrary code
execution via crafted ServerHello message
- debian/
session id size. Based on upstream patch. (LP: #1326779)
-- Tyler Hicks <email address hidden> Thu, 11 Jun 2015 10:51:35 -0500
| Changed in gnutls28 (Ubuntu): | |
| status: | Confirmed → Fix Released |
| Launchpad Janitor (janitor) wrote : | #12 |
This bug was fixed in the package gnutls28 - 3.2.11-2ubuntu1.1
---------------
gnutls28 (3.2.11-2ubuntu1.1) trusty-security; urgency=medium
[ Gianfranco Costamagna ]
* SECURITY UPDATE: Denial of service and possible remote arbitrary code
execution via crafted ServerHello message
- debian/
session id size. Based on upstream patch. (LP: #1326779)
[ Tyler Hicks ]
* debian/
CVE-2014-3466's fix. Based on upstream patch.
-- Tyler Hicks <email address hidden> Thu, 11 Jun 2015 10:42:35 -0500
| Changed in gnutls28 (Ubuntu): | |
| status: | Confirmed → Fix Released |


Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res