Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in gnutls
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in gnutls
ID: MDVSA-2012:045
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0, Mandriva 2010.1, Mandriva 2011
Datum: Sa, 31. März 2012, 09:13
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4128
Applikationen: GNU Transport Layer Security Library

Originalnachricht

This is a multi-part message in MIME format...

------------=_1333126094-2905-117

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:045
http://www.mandriva.com/security/
_______________________________________________________________________

Package : gnutls
Date : March 30, 2012
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in GnuTLS:

Buffer overflow in the gnutls_session_get_data function in
lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before
3.0.7, when used on a client that performs nonstandard session
resumption, allows remote TLS servers to cause a denial of service
(application crash) via a large SessionTicket (CVE-2011-4128).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4128
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.1:
2bfd265514dab79f39f776dbd582df72
2010.1/i586/gnutls-2.8.6-1.2mdv2010.2.i586.rpm
62167460d1ac31b2e7d54bc0a5f98ab5
2010.1/i586/libgnutls26-2.8.6-1.2mdv2010.2.i586.rpm
043750d56eb108f763317746ce920a85
2010.1/i586/libgnutls-devel-2.8.6-1.2mdv2010.2.i586.rpm
13ee1e088f22ffabfe82b81e00f9e799
2010.1/SRPMS/gnutls-2.8.6-1.2mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
6b57aa2034c33232fe12b1b2953e242c
2010.1/x86_64/gnutls-2.8.6-1.2mdv2010.2.x86_64.rpm
b2303b9b8dbff9a4755c561f601813f4
2010.1/x86_64/lib64gnutls26-2.8.6-1.2mdv2010.2.x86_64.rpm
af7670014b92577273944140cabe1b6f
2010.1/x86_64/lib64gnutls-devel-2.8.6-1.2mdv2010.2.x86_64.rpm
13ee1e088f22ffabfe82b81e00f9e799
2010.1/SRPMS/gnutls-2.8.6-1.2mdv2010.2.src.rpm

Mandriva Linux 2011:
6bb123df1f3176c25bb16105dc4fe7f3
2011/i586/gnutls-2.12.8-0.2-mdv2011.0.i586.rpm
23136ce1d38388653c690920c3baeb52
2011/i586/libgnutls26-2.12.8-0.2-mdv2011.0.i586.rpm
7561fb656d238acc33c6b61f20ddc8e9
2011/i586/libgnutls-devel-2.12.8-0.2-mdv2011.0.i586.rpm
5c0d0353c2ae4ec477b85d0194bf5872
2011/i586/libgnutls-ssl27-2.12.8-0.2-mdv2011.0.i586.rpm
41e127901e9fe3e84bf5ead8096c1665 2011/SRPMS/gnutls-2.12.8-0.2.src.rpm

Mandriva Linux 2011/X86_64:
bdd5be3403f8530f39f97ce90bad898e
2011/x86_64/gnutls-2.12.8-0.2-mdv2011.0.x86_64.rpm
51e3ada87157880774baab204af5a743
2011/x86_64/lib64gnutls26-2.12.8-0.2-mdv2011.0.x86_64.rpm
51b6cbff72d89135a680da20cf5df143
2011/x86_64/lib64gnutls-devel-2.12.8-0.2-mdv2011.0.x86_64.rpm
4f9a99872bdd82fe2a2b597ea32d70af
2011/x86_64/lib64gnutls-ssl27-2.12.8-0.2-mdv2011.0.x86_64.rpm
41e127901e9fe3e84bf5ead8096c1665 2011/SRPMS/gnutls-2.12.8-0.2.src.rpm

Mandriva Enterprise Server 5:
c662a0d8e022c7db282e577eac367ccd mes5/i586/gnutls-2.4.1-2.7mdvmes5.2.i586.rpm
ee9687cbb56d4a6520d3144ec6a317a3
mes5/i586/libgnutls26-2.4.1-2.7mdvmes5.2.i586.rpm
342295e2fe6f1ec99890d08ec280b004
mes5/i586/libgnutls-devel-2.4.1-2.7mdvmes5.2.i586.rpm
e00df4c4bf35636194532f0b4a900901 mes5/SRPMS/gnutls-2.4.1-2.7mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
29fa0ac0deb42e8e6c6b947487ef323f
mes5/x86_64/gnutls-2.4.1-2.7mdvmes5.2.x86_64.rpm
21539a631a3cdb64e47537709524f5eb
mes5/x86_64/lib64gnutls26-2.4.1-2.7mdvmes5.2.x86_64.rpm
1da550d6eb22b8014359eaa80be49ed1
mes5/x86_64/lib64gnutls-devel-2.4.1-2.7mdvmes5.2.x86_64.rpm
e00df4c4bf35636194532f0b4a900901 mes5/SRPMS/gnutls-2.4.1-2.7mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPdbT3mqjQ0CJFipgRAmu6AJ9KTkzBqPT1sq5MDRmXrcmcj1pZrACfWAHC
JxJv5MUBpjjzq7IaZpWm/8E=
=EiVf
-----END PGP SIGNATURE-----


------------=_1333126094-2905-117
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1333126094-2905-117--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung