lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 15 Mar 2015 21:42:48 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3191-1] gnutls26 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3191-1                   security@...ian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
March 15, 2015                         http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gnutls26
CVE ID         : CVE-2015-0282 CVE-2015-0294

Multiple vulnerabilities have been discovered in GnuTLS, a library
implementing the TLS and SSL protocols. The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2015-0282

    GnuTLS does not verify the RSA PKCS #1 signature algorithm to match
    the signature algorithm in the certificate, leading to a potential
    downgrade to a disallowed algorithm without detecting it.

CVE-2015-0294

    It was reported that GnuTLS does not check whether the two signature
    algorithms match on certificate import.

For the stable distribution (wheezy), these problems have been fixed in
version 2.12.20-8+deb7u3.

We recommend that you upgrade your gnutls26 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=P4s3
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ