Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in mingw-gnutls
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in mingw-gnutls
ID: FEDORA-2014-6953
Distribution: Fedora
Plattformen: Fedora 20
Datum: Di, 10. Juni 2014, 07:34
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
Applikationen: GNU Transport Layer Security Library

Originalnachricht

Name        : mingw-gnutls
Product : Fedora 20
Version : 3.1.25
Release : 1.fc20
URL : http://www.gnutls.org/
Summary : MinGW GnuTLS TLS/SSL encryption library
Description :
GnuTLS TLS/SSL encryption library. This library is cross-compiled
for MinGW.

-------------------------------------------------------------------------------
-
Update Information:

Version 3.1.25 (released 2014-05-30)

* libgnutls: Eliminated memory corruption issue in Server Hello parsing. Issue
reported by Joonas Kuorilehto of Codenomicon.

* libgnutls: Increased the maximum certificate size buffer in the PKCS #11
subsystem.

* libgnutls: Check the return code of getpwuid_r() instead of relying on the
result value. That avoids issue in certain systems, when using tofu authentication and the home path cannot be determined. Issue reported by Viktor Dukhovni.

Version 3.2.14 (released 2014-05-06)

* libgnutls: Fixed issue with the check of incoming data when two different
recv and send pointers have been specified. Reported and investigated by JMRecio.

* libgnutls: Fixed issue in the RSA-PSK key exchange, which would result to
illegal memory access if a server hint was provided.

* libgnutls: Fixed client memory leak in the PSK key exchange, if a server hint
was provided.

* libgnutls: Several small bug fixes identified using valgrind and the
Codenomicon TLS test suite.

* libgnutls: Several small bug fixes found by coverity.
-------------------------------------------------------------------------------
-
ChangeLog:

* Sat May 31 2014 Michael Cronenworth <mike@cchtml.com> - 3.1.25-1
- Update to 3.1.25
- Fixes CVE-2014-3466 (#1103047)
* Mon May 26 2014 Michael Cronenworth <mike@cchtml.com> - 3.1.24-1
- Update to 3.1.24
* Thu Apr 17 2014 Michael Cronenworth <mike@cchtml.com> - 3.1.23-1
- Update to 3.1.23
* Tue Mar 4 2014 Michael Cronenworth <mike@cchtml.com> - 3.1.22-1
- Update to 3.1.22
- Fixes CVE-2014-0092 and CVE-2014-1959
* Thu Feb 13 2014 Michael Cronenworth <mike@cchtml.com> - 3.1.21-1
- Update to 3.1.21
* Sun Jan 26 2014 Michael Cronenworth <mike@cchtml.com> - 3.1.18-1
- Update to 3.1.18
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1101932 - CVE-2014-3466 gnutls: insufficient session id length
check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)
https://bugzilla.redhat.com/show_bug.cgi?id=1101932
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update mingw-gnutls' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung