Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| gnutls28 | fixed | 3.8.12-1 | package | |
| gnutls28 | not-affected | trixie | package | |
| gnutls28 | not-affected | bookworm | package | |
| gnutls28 | not-affected | bullseye | package |
Примечания
https://gitlab.com/gnutls/gnutls/-/issues/1790
Introduced with: https://gitlab.com/gnutls/gnutls/-/commit/33034a91c2c1f38bad19e747d3021885d54bfb44 (3.8.11)
Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/acf67a4a68bc6d9ab7b882469c67f6cf28db56a0 (3.8.12)
Связанные уязвимости
A TLS 1.3 resumption attempt with an invalid PSK binder value in ClientHello could lead to a denial of service attack via crashing the server.
A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and resulting in a remote Denial of Service (DoS) condition.