You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa gnutls26

Sigurnosni nedostaci programskog paketa gnutls26

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2121-1
February 25, 2014

gnutls26 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 13.10
– Ubuntu 12.10
– Ubuntu 12.04 LTS

Summary:

GnuTLS incorrectly validated certain intermediate certificates.

Software Description:
– gnutls26: GNU TLS library

Details:

Suman Jana discovered that GnuTLS incorrectly handled version 1
intermediate certificates. This resulted in them being considered to be a
valid CA certificate by default, which was contrary to documented
behaviour.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
libgnutls26 2.12.23-1ubuntu4.1

Ubuntu 12.10:
libgnutls26 2.12.14-5ubuntu4.5

Ubuntu 12.04 LTS:
libgnutls26 2.12.14-5ubuntu3.6

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2121-1
CVE-2014-1959

Package Information:
https://launchpad.net/ubuntu/+source/gnutls26/2.12.23-1ubuntu4.1
https://launchpad.net/ubuntu/+source/gnutls26/2.12.14-5ubuntu4.5
https://launchpad.net/ubuntu/+source/gnutls26/2.12.14-5ubuntu3.6

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=awuS
—–END PGP SIGNATURE—–

AutorMarko Stanec
Cert idNCERT-REF-2014-02-0010-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskih paketa postgresql84 i postgresql

Otkriveni su sigurnosni nedostaci u programskim paketima postgresql84 i postgresql za Red Hat Enterprise Linux 5 i 6. Otkriveni nedostaci...

Close