Bugzilla – Bug 1043398
VUL-1: CVE-2017-7507: gnutls: Crash upon receiving well-formed status_request extension
Last modified: 2017-07-14 22:41:20 UTC
rh#1454621 It was found that GnuTLS would crash when receiving a client hello message with status_request extension that has a non-empty responder_id_list. References: https://bugzilla.redhat.com/show_bug.cgi?id=1454621 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7507
upstream advisory: https://www.gnutls.org/security.html#GNUTLS-SA-2017-4
Code: https://gitlab.com/gnutls/gnutls/commit/4c4d35264fada08b6536425c051fb8e0b05ee86b ext/status_request: ensure response IDs are properly deinitialized https://gitlab.com/gnutls/gnutls/commit/3efb6c5fd0e3822ec11879d5bcbea0e8d322cd03 ext/status_request: Removed the parsing of responder IDs from client extension Doc: https://gitlab.com/gnutls/gnutls/commit/e1d6c59a7b0392fb3b8b75035614084a53e2c8c9 gnutls_ocsp_status_request_enable_client: documented requirements for parameters
SUSE-SU-2017:1838-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1034173,1038337,1043398 CVE References: CVE-2017-7507,CVE-2017-7869 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): gnutls-3.2.15-18.3.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): gnutls-3.2.15-18.3.1 SUSE Linux Enterprise Server 12-SP2 (src): gnutls-3.2.15-18.3.1 SUSE Linux Enterprise Desktop 12-SP2 (src): gnutls-3.2.15-18.3.1
release 42.2, done
openSUSE-SU-2017:1875-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1034173,1038337,1043398 CVE References: CVE-2017-7507,CVE-2017-7869 Sources used: openSUSE Leap 42.2 (src): gnutls-3.2.15-11.3.1