| Summary: | gnutls new security issue CVE-2014-1959 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | balaton, fundawang, mageia, oe, rverschelde, stormi-mageia, sysadmin-bugs, tmb |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/586796/ | ||
| Whiteboard: | MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok advisory | ||
| Source RPM: | gnutls | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-02-14 00:00:01 CET
David Walser
2014-02-14 00:00:22 CET
CC:
(none) =>
fundawang fixed with gnutls-3.1.16-1.1.mga3, gnutls-3.2.7-1.1.mga4 and gnutls-3.2.11-1.mga5 CC:
(none) =>
oe Thanks Oden! Advisory: ======================== Updated gnutls packages fix security vulnerability: Suman Jana reported a vulnerability that affects the certificate verification functions of gnutls 3.1.x and gnutls 3.2.x. A version 1 intermediate certificate will be considered as a CA certificate by default (something that deviates from the documented behavior) (CVE-2014-1959). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959 http://www.gnutls.org/security.html#GNUTLS-SA-2014-1 ======================== Updated packages in core/updates_testing: ======================== gnutls-3.1.16-1.1.mga3 libgnutls28-3.1.16-1.1.mga3 libgnutls-ssl27-3.1.16-1.1.mga3 libgnutls-xssl0-3.1.16-1.1.mga3 libgnutls-devel-3.1.16-1.1.mga3 gnutls-3.2.7-1.1.mga4 libgnutls28-3.2.7-1.1.mga4 libgnutls-ssl27-3.2.7-1.1.mga4 libgnutls-xssl0-3.2.7-1.1.mga4 libgnutls-devel-3.2.7-1.1.mga4 from SRPMS: gnutls-3.1.16-1.1.mga3.src.rpm gnutls-3.2.7-1.1.mga4.src.rpm Version:
Cauldron =>
4 basic testing procedure (feel free to add to it): https://bugs.mageia.org/show_bug.cgi?id=6911#c1 CC:
(none) =>
stormi Basic testing as per above in M3-64 goes OK. Note: as an additional test you can type e.g.: GET / HTTP/1.1 Host: www.mageia.org into gnutls-cli to simulate an HTTP request, but really this doesn't actually test the TLS but any more than a random connection, so it's somewhat pointless :) CC:
(none) =>
mageia Basic testing M4-64 OK. Whiteboard:
MGA3TOO has_procedure mga3-64-ok =>
MGA3TOO has_procedure mga3-64-ok mga4-64-ok Tested successfully on Mga3-32 with the procedure above. CC:
(none) =>
balaton Testing complete Mageia 4 i586. -- Validating update. Advisory has been uploaded. Please push to 3 & 4 core/updates. Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGASA-2014-0077.html Status:
NEW =>
RESOLVED
David Walser
2014-02-18 17:49:35 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/586796/ |