UbuntuUpdates.org

Package "libgnutls-openssl27"

Name: libgnutls-openssl27

Description:

GNU TLS library - OpenSSL wrapper

Latest version: 2.12.23-12ubuntu2.8
Release: trusty (14.04)
Level: updates
Repository: main
Head package: gnutls26
Homepage: http://www.gnutls.org/

Links


Download "libgnutls-openssl27"


Other versions of "libgnutls-openssl27" in Trusty

Repository Area Version
base main 2.12.23-12ubuntu2
security main 2.12.23-12ubuntu2.8
proposed main 2.12.23-12ubuntu2.10

Changelog

Version: 2.12.23-12ubuntu2.8 2017-06-13 19:06:40 UTC

  gnutls26 (2.12.23-12ubuntu2.8) trusty-security; urgency=medium

  * SECURITY UPDATE: DoS and possible code execution via OpenPGP
    certificate decoding
    - debian/patches/CVE-2017-7869.patch: enforce packet limits in
      lib/opencdk/read-packet.c.
    - CVE-2017-7869

 -- Marc Deslauriers <email address hidden> Mon, 12 Jun 2017 09:35:01 -0400

Source diff to previous version
CVE-2017-7869 GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function

Version: 2.12.23-12ubuntu2.7 2017-03-20 19:06:58 UTC

  gnutls26 (2.12.23-12ubuntu2.7) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via warning alerts
    - debian/patches/CVE-2016-8610.patch: set a maximum number of warning
      messages in lib/gnutls_int.h, lib/gnutls_handshake.c,
      lib/gnutls_state.c.
    - CVE-2016-8610

 -- Marc Deslauriers <email address hidden> Wed, 15 Mar 2017 15:20:21 -0400

Source diff to previous version
CVE-2016-8610 SSL/TLS SSL3_AL_WARNING undefined alert DoS

Version: 2.12.23-12ubuntu2.6 2017-02-01 20:06:47 UTC

  gnutls26 (2.12.23-12ubuntu2.6) trusty-security; urgency=medium

  * SECURITY UPDATE: out of memory error in stream reading functions
    - debian/patches/CVE-2017-5335.patch: add error checking to
      lib/opencdk/read-packet.c.
    - CVE-2017-5335
  * SECURITY UPDATE: stack overflow in cdk_pk_get_keyid
    - debian/patches/CVE-2017-5336.patch: check return code in
      lib/opencdk/pubkey.c.
    - CVE-2017-5336
  * SECURITY UPDATE: heap read overflow when reading streams
    - debian/patches/CVE-2017-5337.patch: add more precise checks to
      lib/opencdk/read-packet.c.
    - CVE-2017-5337

 -- Marc Deslauriers <email address hidden> Thu, 26 Jan 2017 13:42:43 -0500

Source diff to previous version

Version: 2.12.23-12ubuntu2.5 2016-02-24 19:07:38 UTC

  gnutls26 (2.12.23-12ubuntu2.5) trusty-security; urgency=medium

  * debian/patches/compare_ca_name_and_key.patch: when comparing a CA
    certificate with the trusted list compare the name and key. This will
    allow the future removal of 1024-bit RSA keys from the ca-certificates
    package.

 -- Marc Deslauriers <email address hidden> Fri, 05 Feb 2016 08:49:43 -0500

Source diff to previous version

Version: 2.12.23-12ubuntu2.4 2016-01-08 15:06:20 UTC

  gnutls26 (2.12.23-12ubuntu2.4) trusty-security; urgency=medium

  * SECURITY UPDATE: incorrect RSA+MD5 support with TLS 1.2
    - debian/patches/CVE-2015-7575.patch: do not consider any values from
      the extension data to decide acceptable algorithms in
      lib/ext_signature.c.
    - CVE-2015-7575

 -- Marc Deslauriers Thu, 07 Jan 2016 10:38:24 -0500

CVE-2015-7575 MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature



About   -   Send Feedback to @ubuntu_updates