[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-10-23 Thread Bug Watch Updater
** Changed in: gnutls28 (Debian)
   Status: Unknown => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-10-14 Thread Matthieu Clemenceau
** Tags added: fr-693

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-28 Thread Launchpad Bug Tracker
This bug was fixed in the package gnutls28 - 3.6.15-4ubuntu2

---
gnutls28 (3.6.15-4ubuntu2) groovy; urgency=low

  * Merge from Debian unstable LP: #1893924.  Remaining changes:
- Enable CET.
- Set default priority string to only allow TLS1.2, DTLS1.2, and
TLS1.3 with medium security profile (2048 RSA keys minimum, and
similar).
  * Add patch to fix ftbfs gnulib with new glibc.

gnutls28 (3.6.15-4) unstable; urgency=medium

  * autopkgtest: Require build-essential.
  * autopkgtest: respect dpkg-buildflags for helper-binary build.

gnutls28 (3.6.15-3) unstable; urgency=medium

  * More autopkgtest hotfixes.

gnutls28 (3.6.15-2) unstable; urgency=medium

  * 50_autopkgtestfixes.diff: Fix testsuite issues when running against
installed gnutls-bin.
  * In autopkgtest set top_builddir and builddir, ignore
tests/cert-tests/tolerate-invalid-time and tests/gnutls-cli-debug.sh.

gnutls28 (3.6.15-1) unstable; urgency=low

  * New upstream version.
+ Fixes NULL pointer dereference if a no_renegotiation alert is sent with
  unexpected timing. CVE-2020-24659 / GNUTLS-SA-2020-09-04
  Closes: #969547
+ Drop 50_01-serv-omit-upper-bound-of-maxearlydata-option-definit.patch
  50_02-gnutls_aead_cipher_init-fix-potential-memleak.patch
  50_03-gnutls_cipher_init-fix-potential-memleak.patch
  50_04-crypto-api-always-allocate-memory-when-serializing-i.patch
+ Fix build error due to outdated gettext in Debian by removing newer
  gettext m4 macros from m4/.

gnutls28 (3.6.14-2) unstable; urgency=medium

  * Pull selected patches from upstream GIT:
+ 50_01-serv-omit-upper-bound-of-maxearlydata-option-definit.patch:
  Fixes difference in generated docs on 32 and 64 bit archs.
+ 50_02-gnutls_aead_cipher_init-fix-potential-memleak.patch
  50_03-gnutls_cipher_init-fix-potential-memleak.patch
  Fix memleak in gnutls_aead_cipher_init() with keys having invalid
  length. (Broken since 3.6.3)
+ 50_04-crypto-api-always-allocate-memory-when-serializing-i.patch
  Closes: #962467

gnutls28 (3.6.14-1) unstable; urgency=high

  * Drop debugging code added in -4, fixes nocheck profile build error.
Closes: #962199
  * Add Daiki Ueno 462225C3B46F34879FC8496CD605848ED7E69871 key to
debian/upstream/signing-key.asc.
  * New upstream version.
+ Fixes insecure session ticket key construction.
  [GNUTLS-SA-2020-06-03, CVE-2020-13777] Closes: #962289
+ Drop 50_Update-session_ticket.c-to-add-support-for-zero-leng.patch
  51_01-_gnutls_pkcs11_verify_crt_status-check-validity-agai.patch
  51_02-x509-trigger-fallback-verification-path-when-cert-is.patch
  51_03-tests-add-test-case-for-certificate-chain-supersedin.patch
  * Drop guile-gnutls.lintian-overrides.
  * 40_fix_ipv6only_testsuite_AI_ADDRCONFIG.diff: In gnutls-serv do not pass
AI_ADDRCONFIG to getaddrinfo. This broke the testsuite on systems without
IPv4 on non-loopback addresses. (Thanks, Adrian Bunk and Julien Cristau!)
Hopefully Closes: #962218

 -- Dimitri John Ledkov   Thu, 24 Sep 2020 12:03:44
+0100

** Changed in: gnutls28 (Ubuntu Groovy)
   Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-13777

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-24659

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-24 Thread Dimitri John Ledkov
" onto Ubuntu 20.20" I hope you mean 20.10 there (groovy), for which the
fix is now pending.

** Changed in: gnutls28 (Ubuntu Groovy)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-24 Thread Björn Jacke
with the argumenatation in comment #4 you are basically arking all
developers and users also installing 3rd party packages to stop using
Ubuntu ?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-24 Thread Dimitri John Ledkov
However we only ship samba 4.11 in focal, thus not affected by this
change?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-24 Thread Dimitri John Ledkov
what is the test case for this issue? Reading upstream bug report I am
not sure this is reproducible without macOS client, or is it?

** No longer affects: gnutls28 (Ubuntu Focal)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-24 Thread Dimitri John Ledkov
** Changed in: gnutls28 (Ubuntu Groovy)
   Status: New => Confirmed

** Also affects: gnutls28 (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-17 Thread Brian Murray
** Also affects: gnutls28 (Ubuntu Groovy)
   Importance: High
   Status: New

** Tags removed: rls-gg-incoming

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-08 Thread Andrew Bartlett
Sure, but as upstream we otherwise need to warn Samba users not to
deploy current versions onto Ubuntu 20.20, so it would be awesome if
this could be fixed.

Both Samba 4.12 and 4.13 (due to be released next week) are impacted.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-04 Thread Sebastien Bacher
The issue should be fixed in the current Debian gnutls28 version but
that hasn't been merged yet. On focal the samba package is at 4.11 so
that shouldn't be an issue?

** Bug watch added: Debian Bug tracker #962467
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962467

** Also affects: gnutls28 (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962467
   Importance: Unknown
   Status: Unknown

** Changed in: gnutls28 (Ubuntu)
   Importance: Undecided => High

** Tags added: rls-gg-incoming

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893924] Re: memory leak in GnuTLS iov operations used by Samba

2020-09-02 Thread Björn Jacke
** Bug watch added: Samba Bugzilla #14399
   https://bugzilla.samba.org/show_bug.cgi?id=14399

** Also affects: gnutls via
   https://bugzilla.samba.org/show_bug.cgi?id=14399
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893924

Title:
  memory leak in GnuTLS iov operations used by Samba

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnutls/+bug/1893924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs