gnutls-2.12.23-21.AXS4
エラータID: AXSA:2017-1381:01
GnuTLS is a project that aims to develop a library which provides a secure
layer, over a reliable transport layer. Currently the GnuTLS library implements
the proposed standards by the IETF's TLS working group.
Security issues fixed with this release:
CVE-2016-8610
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2017-5335
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2017-5336
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2017-5337
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
The following packages have been upgraded to a later upstream version: gnutls (2.12.23).
Additional Changes:
Update package.
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
N/A
SRPMS
- gnutls-2.12.23-21.AXS4.src.rpm
MD5: 044c1d1e8b091db73509b6fd255bd2f6
SHA-256: fc9724c0576a486a04366f7835f98a97803298442dcd12e4df1f01369e941a34
Size: 8.50 MB
Asianux Server 4 for x86
- gnutls-2.12.23-21.AXS4.i686.rpm
MD5: d6cad4562f6a18edb9fe949b1ad34fb0
SHA-256: 993f33c273c8c215df661bee21cc9a83a03c4511b1d928461e33e8e0b47dcce2
Size: 382.31 kB - gnutls-devel-2.12.23-21.AXS4.i686.rpm
MD5: 9e534675e2edc3ada9807cc97877672e
SHA-256: 3495839c7f7428b1f79b7ec783baa6a84b8b0d3d03df1ab949f0666adb3bb176
Size: 1.21 MB - gnutls-utils-2.12.23-21.AXS4.i686.rpm
MD5: 953efacb50ef27eb449a616a4fd8fb59
SHA-256: f9379710b8fa85dd66fe359bb782f3224ae731934ddbd9cd1b130874aa1737d2
Size: 105.45 kB
Asianux Server 4 for x86_64
- gnutls-2.12.23-21.AXS4.x86_64.rpm
MD5: 31dc45727d3b1d4cff8310245ca8262c
SHA-256: 70d5fc0705a5ecf9121408e20e80ff00dbe9e32679e85be29bef0ee5a6c87e69
Size: 388.38 kB - gnutls-devel-2.12.23-21.AXS4.x86_64.rpm
MD5: 58fb27d7382bb83d2016560c94fc5953
SHA-256: bb167f4d086af24de176bf1f68bcccab7a9d06be038018a6f45f124849e4abbc
Size: 1.21 MB - gnutls-utils-2.12.23-21.AXS4.x86_64.rpm
MD5: 74aea433a1ff0b7b5bbbe2636c5dbce5
SHA-256: 836e594537040d92486554be2cc140146ef7d83db4815af6039dacfa91999e54
Size: 107.69 kB - gnutls-2.12.23-21.AXS4.i686.rpm
MD5: d6cad4562f6a18edb9fe949b1ad34fb0
SHA-256: 993f33c273c8c215df661bee21cc9a83a03c4511b1d928461e33e8e0b47dcce2
Size: 382.31 kB - gnutls-devel-2.12.23-21.AXS4.i686.rpm
MD5: 9e534675e2edc3ada9807cc97877672e
SHA-256: 3495839c7f7428b1f79b7ec783baa6a84b8b0d3d03df1ab949f0666adb3bb176
Size: 1.21 MB