Bug#856872: jessie-pu: package gnutls28/3.3.8-6+deb8u5
Andreas Metzler
ametzler at bebt.de
Sun Mar 5 18:08:08 UTC 2017
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian.org at packages.debian.org
Usertags: pu
Hello,
I would like fix a number of minor issues in GnuTLS.
Most of these (notably CVE-2017-533[4567]) are related to the PGP
support, security does not intend to issue a DSA:
+ 55_00_pkcs12-fixed-the-calculation-of-p_size.patch
Fixed issue in PKCS#12 password encoding, which truncated
passwords over 32-characters. Reported by Mario Klebsch.
+ 55_01_gnutls_x509_ext_import_proxy-fix-issue-reading-the-p.patch
Fix double free in certificate information printing. If the PKIX
extension proxy was set with a policy language set but no policy
specified, that could lead to a double free. [GNUTLS-SA-2017-1]
CVE-2017-5334
+ 55_02_auth-rsa-eliminated-memory-leak-on-pkcs-1-formatting.patch
Addressed memory leak in server side error path (issue found using
oss-fuzz project)
+ 55_03_opencdk-Fixes-to-prevent-undefined-behavior-found-wi.patch
55_04_Do-not-infinite-loop-if-an-EOF-occurs-while-skipping.patch
55_05_Attempt-to-fix-a-leak-in-OpenPGP-cert-parsing.patch
55_06_Corrected-a-leak-in-OpenPGP-sub-packet-parsing.patch
55_07_opencdk-read_attribute-added-more-precise-checks-whe.patch
55_08_opencdk-cdk_pk_get_keyid-fix-stack-overflow.patch
55_09_opencdk-added-error-checking-in-the-stream-reading-f.patch
55_10_opencdk-improved-error-code-checking-in-the-stream-r.patch
55_11_opencdk-read-packet.c-corrected-typo-in-type-cast.patch
Addressed memory leaks and an infinite loop in OpenPGP certificate
parsing. Fixes by Alex Gaynor. (issues found using oss-fuzz project)
Addressed invalid memory accesses in OpenPGP certificate parsing.
(issues found using oss-fuzz project) [GNUTLS-SA-2017-2]
CVE-2017-5335 / CVE-2017-5336 / CVE-2017-5337
+ 55_12_gnutls_pkcs11_obj_list_import_url2-Always-return-an-.patch
When returning success, but no elements,
gnutls_pkcs11_obj_list_import_url4, could have returned zero number of
elements with a pointer that was uninitialized. Ensure that an
initialized (i.e., null in that case), pointer is always returned.
+ 55_13_cdk_pkt_read-enforce-packet-limits.patch Addressed integer
overflow resulting to invalid memory write in OpenPGP certificate
parsing. Issue found using oss-fuzz project:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
[GNUTLS-SA-2017-3A]
+ 55_14_opencdk-read_attribute-account-buffer-size.patch Addressed read
of 1 byte past the end of buffer in OpenPGP certificate parsing. Issue
found using oss-fuzz project:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=391
(This patch is from gnutls_3_5_x branch.)
+ 55_15_opencdk-do-not-parse-any-secret-keys-in-packet-when-.patch
Addressed crashes in OpenPGP certificate parsing, related to private key
parser. No longer allow OpenPGP certificates (public keys) to contain
private key sub-packets. Issue found using oss-fuzz project:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=354
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=360
[GNUTLS-SA-2017-3B]
--
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'
-------------- next part --------------
A non-text attachment was scrubbed...
Name: from_u4_to_u5.diff
Type: text/x-diff
Size: 41916 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnutls-maint/attachments/20170305/7cd50b83/attachment-0001.diff>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnutls-maint/attachments/20170305/7cd50b83/attachment-0001.sig>
More information about the Pkg-gnutls-maint
mailing list