UbuntuUpdates.org

Package "libgnutls-openssl27"

Name: libgnutls-openssl27

Description:

GNU TLS library - OpenSSL wrapper

Latest version: 2.12.23-12ubuntu2.8
Release: trusty (14.04)
Level: updates
Repository: main
Head package: gnutls26
Homepage: http://www.gnutls.org/

Links


Download "libgnutls-openssl27"


Other versions of "libgnutls-openssl27" in Trusty

Repository Area Version
base main 2.12.23-12ubuntu2
security main 2.12.23-12ubuntu2.8
proposed main 2.12.23-12ubuntu2.10

Changelog

Version: 2.12.23-12ubuntu2.3 2015-11-30 22:07:33 UTC

  gnutls26 (2.12.23-12ubuntu2.3) trusty-security; urgency=medium

  * SECURITY UPDATE: Poodle TLS issue
    - debian/patches/fix_tls_poodle.patch: fixes off by one
      issue in padding check.
      Patch created by Hanno Boeck (https://hboeck.de/)
    (LP: #1510163)

 -- Bryan Quigley Wed, 25 Nov 2015 21:37:33 +0000

Source diff to previous version
1510163 Poodle TLS1.0 issue in Trusty (and Precise)

Version: 2.12.23-12ubuntu2.2 2015-03-23 21:06:50 UTC

  gnutls26 (2.12.23-12ubuntu2.2) trusty-security; urgency=medium

  * SECURITY UPDATE: signature forgery issue
    - debian/patches/CVE-2015-0282.patch: make sure the signature
      algorithms match in lib/gnutls_algorithms.c, lib/gnutls_algorithms.h,
      lib/gnutls_pubkey.c, lib/gnutls_sig.c, lib/x509/common.h,
      lib/x509/crq.c, lib/x509/privkey.c, lib/x509/verify.c,
      lib/x509/x509.c, lib/x509/x509_int.h.
    - CVE-2015-0282
  * SECURITY UPDATE: certificate algorithm consistency issue
    - debian/patches/CVE-2015-0294.patch: make sure the two signature
      algorithms match on cert import in lib/x509/x509.c.
    - CVE-2015-0294
 -- Marc Deslauriers <email address hidden> Fri, 20 Mar 2015 09:08:01 -0400

Source diff to previous version
CVE-2015-0282 Signature forgery
CVE-2015-0294 certificate algorithm consistency checking issue

Version: 2.12.23-12ubuntu2.1 2014-06-02 15:07:01 UTC

  gnutls26 (2.12.23-12ubuntu2.1) trusty-security; urgency=medium

  * SECURITY UPDATE: memory corruption due to server hello parsing
    - debian/patches/CVE-2014-3466.patch: validate session_id_len in
      lib/gnutls_handshake.c.
    - CVE-2014-3466
 -- Marc Deslauriers <email address hidden> Sun, 01 Jun 2014 11:03:46 -0400




About   -   Send Feedback to @ubuntu_updates