First published: Mon Mar 11 2024(Updated: )
A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/gnutls28 | <3.7.3-4ubuntu1.5 | 3.7.3-4ubuntu1.5 |
ubuntu/gnutls28 | <3.8.1-4ubuntu1.3 | 3.8.1-4ubuntu1.3 |
ubuntu/gnutls28 | <3.8.3-1.1ubuntu3.1 | 3.8.3-1.1ubuntu3.1 |
debian/gnutls28 | <=3.7.1-5+deb11u4<=3.7.1-5+deb11u3<=3.7.9-2+deb12u2 | 3.6.7-4+deb10u8 3.6.7-4+deb10u12 3.8.5-4 |
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
redhat/gnutls | <3.8.4 | 3.8.4 |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28835 has been identified as a high-severity vulnerability that can lead to application crashes.
To fix CVE-2024-28835, you should upgrade to a patched version of GnuTLS such as 3.7.3-4ubuntu1.5 for Ubuntu or equivalent versions for other distributions.
CVE-2024-28835 affects GnuTLS versions prior to the specified patched releases, as well as IBM QRadar and F5 Traffix SDC in certain versions.
The vulnerability in CVE-2024-28835 can be triggered by using the 'certtool --verify-chain' command with a specially crafted .pem bundle.
Currently, the best course of action for CVE-2024-28835 is to apply the provided software updates, as no specific workaround has been identified.