You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa mingw-gnutls

Sigurnosni nedostatak programskog paketa mingw-gnutls

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-3493
2014-03-06 07:25:33
——————————————————————————–

Name : mingw-gnutls
Product : Fedora 19
Version : 3.1.22
Release : 1.fc19
URL : http://www.gnutls.org/
Summary : MinGW GnuTLS TLS/SSL encryption library
Description :
GnuTLS TLS/SSL encryption library. This library is cross-compiled
for MinGW.

——————————————————————————–
Update Information:

Version 3.1.22 (released 2014-03-03)

* libgnutls: Corrected certificate verification issue (GNUTLS-SA-2014-2)

* libgnutls: Corrected issue in gnutls_pcert_list_import_x509_raw when provided with invalid data. Reported by Dmitriy Anisimkov.

* libgnutls: Corrected timeout issue in subsequent to the first DTLS handshakes.

* libgnutls: Removed unconditional not-trusted message in gnutls_certificate_verification_status_print() when used with OpenPGP certificates. Reported by Michel Briand.

* libgnutls: All ciphersuites that were available in TLS1.0 or later are now made available in SSL3.0 or later to prevent any incompatibilities with servers that negotiate them in SSL 3.0.

——————————————————————————–
ChangeLog:

* Tue Mar 4 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.22-1
– Update to 3.1.22
– Fixes CVE-2014-0092 and CVE-2014-1959
* Thu Feb 13 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.21-1
– Update to 3.1.21
* Sun Jan 26 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.18-1
– Update to 3.1.18
* Thu Nov 7 2013 Michael Cronenworth <mike@cchtml.com> – 3.1.16-1
– Update to 3.1.16
* Tue Oct 29 2013 Michael Cronenworth <mike@cchtml.com> – 3.1.15-1
– Update to 3.1.15
– Enable ECC NIST Suite B curves
* Sun Sep 22 2013 Michael Cronenworth <mike@cchtml.com> – 3.1.13-1
– Update to 3.1.13
* Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 3.1.11-6
– Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1069865 – CVE-2014-0092 gnutls: incorrect error handling in certificate verification (GNUTLS-SA-2014-2)
https://bugzilla.redhat.com/show_bug.cgi?id=1069865
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mingw-gnutls’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-3454
2014-03-06 07:17:29
——————————————————————————–

Name : mingw-gnutls
Product : Fedora 20
Version : 3.1.22
Release : 1.fc20
URL : http://www.gnutls.org/
Summary : MinGW GnuTLS TLS/SSL encryption library
Description :
GnuTLS TLS/SSL encryption library. This library is cross-compiled
for MinGW.

——————————————————————————–
Update Information:

Version 3.1.22 (released 2014-03-03)

* libgnutls: Corrected certificate verification issue (GNUTLS-SA-2014-2)

* libgnutls: Corrected issue in gnutls_pcert_list_import_x509_raw when provided with invalid data. Reported by Dmitriy Anisimkov.

* libgnutls: Corrected timeout issue in subsequent to the first DTLS handshakes.

* libgnutls: Removed unconditional not-trusted message in gnutls_certificate_verification_status_print() when used with OpenPGP certificates. Reported by Michel Briand.

* libgnutls: All ciphersuites that were available in TLS1.0 or later are now made available in SSL3.0 or later to prevent any incompatibilities with servers that negotiate them in SSL 3.0.

——————————————————————————–
ChangeLog:

* Tue Mar 4 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.22-1
– Update to 3.1.22
– Fixes CVE-2014-0092 and CVE-2014-1959
* Thu Feb 13 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.21-1
– Update to 3.1.21
* Sun Jan 26 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.18-1
– Update to 3.1.18
——————————————————————————–
References:

[ 1 ] Bug #1069865 – CVE-2014-0092 gnutls: incorrect error handling in certificate verification (GNUTLS-SA-2014-2)
https://bugzilla.redhat.com/show_bug.cgi?id=1069865
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mingw-gnutls’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2014-03-0018-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni propust programskog paketa oath-toolkit

Otkriven je sigurnosni propust u programskom paketu oath-toolkit za Mandriva Business Server 1.0. Propust se nalazio u zakomentiranim linijama (koje...

Close