You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa mingw-gnutls

Sigurnosni nedostatak programskog paketa mingw-gnutls

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-6963
2014-06-01 21:21:52
——————————————————————————–

Name : mingw-gnutls
Product : Fedora 19
Version : 3.1.25
Release : 1.fc19
URL : http://www.gnutls.org/
Summary : MinGW GnuTLS TLS/SSL encryption library
Description :
GnuTLS TLS/SSL encryption library. This library is cross-compiled
for MinGW.

——————————————————————————–
Update Information:

Version 3.1.25 (released 2014-05-30)

* libgnutls: Eliminated memory corruption issue in Server Hello parsing. Issue reported by Joonas Kuorilehto of Codenomicon.

* libgnutls: Increased the maximum certificate size buffer in the PKCS #11 subsystem.

* libgnutls: Check the return code of getpwuid_r() instead of relying on the result value. That avoids issue in certain systems, when using tofu authentication and the home path cannot be determined. Issue reported by Viktor Dukhovni.

——————————————————————————–
ChangeLog:

* Sat May 31 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.25-1
– Update to 3.1.25
– Fixes CVE-2014-3466 (#1103047)
* Mon May 26 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.24-1
– Update to 3.1.24
* Thu Apr 17 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.23-1
– Update to 3.1.23
* Tue Mar 4 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.22-1
– Update to 3.1.22
– Fixes CVE-2014-0092 and CVE-2014-1959
* Thu Feb 13 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.21-1
– Update to 3.1.21
* Sun Jan 26 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.18-1
– Update to 3.1.18
* Thu Nov 7 2013 Michael Cronenworth <mike@cchtml.com> – 3.1.16-1
– Update to 3.1.16
* Tue Oct 29 2013 Michael Cronenworth <mike@cchtml.com> – 3.1.15-1
– Update to 3.1.15
– Enable ECC NIST Suite B curves
* Sun Sep 22 2013 Michael Cronenworth <mike@cchtml.com> – 3.1.13-1
– Update to 3.1.13
* Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 3.1.11-6
– Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1101932 – CVE-2014-3466 gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)
https://bugzilla.redhat.com/show_bug.cgi?id=1101932
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mingw-gnutls’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-6953
2014-06-01 21:21:32
——————————————————————————–

Name : mingw-gnutls
Product : Fedora 20
Version : 3.1.25
Release : 1.fc20
URL : http://www.gnutls.org/
Summary : MinGW GnuTLS TLS/SSL encryption library
Description :
GnuTLS TLS/SSL encryption library. This library is cross-compiled
for MinGW.

——————————————————————————–
Update Information:

Version 3.1.25 (released 2014-05-30)

* libgnutls: Eliminated memory corruption issue in Server Hello parsing. Issue reported by Joonas Kuorilehto of Codenomicon.

* libgnutls: Increased the maximum certificate size buffer in the PKCS #11 subsystem.

* libgnutls: Check the return code of getpwuid_r() instead of relying on the result value. That avoids issue in certain systems, when using tofu authentication and the home path cannot be determined. Issue reported by Viktor Dukhovni.

Version 3.2.14 (released 2014-05-06)

* libgnutls: Fixed issue with the check of incoming data when two different recv and send pointers have been specified. Reported and investigated by JMRecio.

* libgnutls: Fixed issue in the RSA-PSK key exchange, which would result to illegal memory access if a server hint was provided.

* libgnutls: Fixed client memory leak in the PSK key exchange, if a server hint was provided.

* libgnutls: Several small bug fixes identified using valgrind and the Codenomicon TLS test suite.

* libgnutls: Several small bug fixes found by coverity.
——————————————————————————–
ChangeLog:

* Sat May 31 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.25-1
– Update to 3.1.25
– Fixes CVE-2014-3466 (#1103047)
* Mon May 26 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.24-1
– Update to 3.1.24
* Thu Apr 17 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.23-1
– Update to 3.1.23
* Tue Mar 4 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.22-1
– Update to 3.1.22
– Fixes CVE-2014-0092 and CVE-2014-1959
* Thu Feb 13 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.21-1
– Update to 3.1.21
* Sun Jan 26 2014 Michael Cronenworth <mike@cchtml.com> – 3.1.18-1
– Update to 3.1.18
——————————————————————————–
References:

[ 1 ] Bug #1101932 – CVE-2014-3466 gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)
https://bugzilla.redhat.com/show_bug.cgi?id=1101932
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mingw-gnutls’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2014-06-0049-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa mingw-icu

Otkriven je sigurnosni nedostatak u programskom paketu mingw-icu za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje napada uskraćivanja...

Close