You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa mbedtls

Sigurnosni nedostatak programskog paketa mbedtls

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2019-07940971b2
2019-10-07 00:53:40.514560
——————————————————————————–

Name : mbedtls
Product : Fedora 30
Version : 2.16.3
Release : 1.fc30
URL : https://tls.mbed.org/
Summary : Light-weight cryptographic and SSL/TLS library
Description :
Mbed TLS is a light-weight open source cryptographic and SSL/TLS
library written in C. Mbed TLS makes it easy for developers to include
cryptographic and SSL/TLS capabilities in their (embedded)
applications with as little hassle as possible.
FOSS License Exception: https://tls.mbed.org/foss-license-exception

——————————————————————————–
Update Information:

– Update to 2.16.3 – Side channel attack on deterministic ECDSA (CVE-2019-16910)
Release notes: https://tls.mbed.org/tech-
updates/releases/mbedtls-2.16.3-and-2.7.12-released Security Advisory:
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-
advisory-2019-10
——————————————————————————–
ChangeLog:

* Sat Sep 28 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.3-1
– Update to 2.16.3
– Side channel attack on deterministic ECDSA (CVE-2019-16910)
* Tue Sep 3 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.2-4
– devel package needs pkcs11-helper-devel (#1748468)
* Sat Aug 3 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.2-3
– Fix building on RHEL8
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> – 2.16.2-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
* Sat Jul 20 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.2-1
– Update to 2.16.2
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-07940971b2’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2019-89891f3e4a
2019-10-07 01:35:41.915363
——————————————————————————–

Name : mbedtls
Product : Fedora 29
Version : 2.16.3
Release : 1.fc29
URL : https://tls.mbed.org/
Summary : Light-weight cryptographic and SSL/TLS library
Description :
Mbed TLS is a light-weight open source cryptographic and SSL/TLS
library written in C. Mbed TLS makes it easy for developers to include
cryptographic and SSL/TLS capabilities in their (embedded)
applications with as little hassle as possible.
FOSS License Exception: https://tls.mbed.org/foss-license-exception

——————————————————————————–
Update Information:

– Update to 2.16.3 – Side channel attack on deterministic ECDSA (CVE-2019-16910)
Release notes: https://tls.mbed.org/tech-
updates/releases/mbedtls-2.16.3-and-2.7.12-released Security Advisory:
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-
advisory-2019-10
——————————————————————————–
ChangeLog:

* Sat Sep 28 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.3-1
– Update to 2.16.3
– Side channel attack on deterministic ECDSA (CVE-2019-16910)
* Tue Sep 3 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.2-4
– devel package needs pkcs11-helper-devel (#1748468)
* Sat Aug 3 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.2-3
– Fix building on RHEL8
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> – 2.16.2-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
* Sat Jul 20 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.2-1
– Update to 2.16.2
* Thu Mar 28 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.1-1
– Update to 2.16.1
* Mon Feb 11 2019 Peter Robinson <pbrobinson@fedoraproject.org> 2.16.0-3
– devel package needs zlib-devel
* Fri Feb 1 2019 Fedora Release Engineering <releng@fedoraproject.org> – 2.16.0-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
* Tue Jan 1 2019 Morten Stevens <mstevens@fedoraproject.org> – 2.16.0-1
– Update to 2.16.0
* Thu Dec 20 2018 Morten Stevens <mstevens@fedoraproject.org> – 2.14.1-2
– Spec file improvements
– Enabled zlib support
* Fri Dec 7 2018 Morten Stevens <mstevens@fedoraproject.org> – 2.14.1-1
– Update to 2.14.1
– CVE-2018-19608 (#1656784)
* Mon Dec 3 2018 Morten Stevens <mstevens@fedoraproject.org> – 2.14.0-1
– Update to 2.14.0
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-89891f3e4a’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorZvonimir Bosnjak
Cert idNCERT-REF-2019-10-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa patch

Otkriveni su sigurnosni nedostaci u programskom paketu patch za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close