Your message dated Wed, 12 Nov 2014 19:18:58 +0000
with message-id <e1xodrs-0008ni...@franck.debian.org>
and subject line Bug#769154: fixed in gnutls28 3.3.8-4
has caused the Debian Bug report #769154,
regarding gnutls28: CVE-2014-8564: Heap corruption when generating key ID for
ECC (GNUTLS-SA-2014-5)
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
769154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769154
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gnutls28
Version: 3.3.8-3
Severity: grave
Tags: security upstream patch fixed-upstream
Hi,
the following vulnerability was published for gnutls28.
CVE-2014-8564[0]:
Heap corruption when generating key ID for ECC (GNUTLS-SA-2014-5)
| An out-of-bounds memory write flaw was found in the way GnuTLS parsed
| certain ECC (Elliptic Curve Cryptography) certificates or certificate
| signing requests (CSR). A malicious user could create a specially
| crafted ECC certificate or a certificate signing request that, when
| processed by an application compiled against GnuTLS (for example,
| certtool), could cause that application to crash or execute arbitrary
| code with the permissions of the user running the application.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2014-8564
[1] http://www.gnutls.org/security.html#GNUTLS-SA-2014-5
[2]
https://gitorious.org/gnutls/gnutls/commit/e821e1908686657a45c1b735f6d077b7a8493e2b
(3.3.x branch)
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: gnutls28
Source-Version: 3.3.8-4
We believe that the bug you reported is fixed in the latest version of
gnutls28, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 769...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andreas Metzler <ametz...@debian.org> (supplier of updated gnutls28 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 12 Nov 2014 19:31:07 +0100
Source: gnutls28
Binary: libgnutls28-dev libgnutls-deb0-28 libgnutls28-dbg gnutls-bin gnutls-doc
guile-gnutls libgnutlsxx28 libgnutls-openssl27
Architecture: source i386 all
Version: 3.3.8-4
Distribution: unstable
Urgency: high
Maintainer: Debian GnuTLS Maintainers <pkg-gnutls-ma...@lists.alioth.debian.org>
Changed-By: Andreas Metzler <ametz...@debian.org>
Description:
gnutls-bin - GNU TLS library - commandline utilities
gnutls-doc - GNU TLS library - documentation and examples
guile-gnutls - GNU TLS library - GNU Guile bindings
libgnutls-deb0-28 - GNU TLS library - main runtime library
libgnutls-openssl27 - GNU TLS library - OpenSSL wrapper
libgnutls28-dbg - GNU TLS library - debugger symbols
libgnutls28-dev - GNU TLS library - development files
libgnutlsxx28 - GNU TLS library - C++ runtime library
Closes: 768841 769154
Changes:
gnutls28 (3.3.8-4) unstable; urgency=high
.
* Drop 31_fallback_to_RUSAGE_SELF.diff.
* 35_recheck_urandom_fd.diff: When gnutls_global_init() is called manually
from the application check the urandom fd for validity. Closes: #768841
and takes care of #760476.
* 36_less_refresh-rnd-state.diff: do not explicitly refresh rnd state on
session deinit. It is already being refreshed during the session lifetime.
* 37_X9.63_sanity_check.diff: when exporting curve coordinates to X9.63
format, perform additional sanity checks on input.
CVE-2014-8564 / GNUTLS-SA-2014-5. Closes: #769154
* 38_testforsanitycheck.diff adds a test for CVE-2014-8564. (As the test
uses a cert in binary der-format which is not representable in a quilt
patches and we want to limit debian.tar.xz to modify stuff in debian/ we
have some special handling in debian/rules.)
Checksums-Sha1:
be68ede7e0ade10180bc4b056640f9efcd6c61b4 2913 gnutls28_3.3.8-4.dsc
13a1bc4e52a8655030c97523f2f95db043a68fe0 88156 gnutls28_3.3.8-4.debian.tar.xz
bd0c77623db9548f0354ee2fdcbd16867d9699e8 679268
libgnutls28-dev_3.3.8-4_i386.deb
f81c43d567aeb01e1f6e64ab001b36510dc08b0d 708914
libgnutls-deb0-28_3.3.8-4_i386.deb
92220ca321e46bb5a307f695c63de7e96fe0cc37 1915472
libgnutls28-dbg_3.3.8-4_i386.deb
4b6ec61a05caff0f01b667251ea30e51fd8f0b8c 309878 gnutls-bin_3.3.8-4_i386.deb
2faec5a12965a13b6a92144034acd476aa266bee 3625982 gnutls-doc_3.3.8-4_all.deb
323557e26210b2296dacdd4ff9983394be232b23 174350 guile-gnutls_3.3.8-4_i386.deb
fc8b73609377dfda09627532d2a50ffae2c51521 15432 libgnutlsxx28_3.3.8-4_i386.deb
a4f053754b912733f7229c23db7808286dc88ad6 141894
libgnutls-openssl27_3.3.8-4_i386.deb
Checksums-Sha256:
1ed6daa569fcb2bc5a794c8024a0b730b26579a4bd6eee8d138a7bb65f6712f1 2913
gnutls28_3.3.8-4.dsc
6ecaee8a683672a2b0e8356c47a968cd837a2da9d0d11b97f225e049bbea2977 88156
gnutls28_3.3.8-4.debian.tar.xz
0dd1b79171b8edac983feac600b9f751e99ba84ff17ed0c52721e5ef23ca17de 679268
libgnutls28-dev_3.3.8-4_i386.deb
fd54d8521f834352bb1553b1603a11f6589b3e447d4706dc6ebff881b25f007d 708914
libgnutls-deb0-28_3.3.8-4_i386.deb
91cea76d48904455ed6262cdbfe79799048074156cd6eef0375e5f8a0053cb59 1915472
libgnutls28-dbg_3.3.8-4_i386.deb
3802bf7a1b0dfec78bb7ce0958656915269a57d6496198caa012cca08b9c820a 309878
gnutls-bin_3.3.8-4_i386.deb
d07ebbdd4283c0865b8fecb5e4bdeb81ba72b995d615aef35618b55990363bd0 3625982
gnutls-doc_3.3.8-4_all.deb
37c9e445eeb05d342b2a07e81db3472a001605df6cb96912d130eec70f484409 174350
guile-gnutls_3.3.8-4_i386.deb
3f75b7fbcdfd3379cc6d322011cbaf2100e66570e3d7a04f444718e8ab6daadb 15432
libgnutlsxx28_3.3.8-4_i386.deb
08cc170a1ef72a2ebd988051e8e75c8ef5d93851ef07a726c7124bd28d0e7552 141894
libgnutls-openssl27_3.3.8-4_i386.deb
Files:
83293811a94214d48fc5cecdc0e4858b 2913 libs optional gnutls28_3.3.8-4.dsc
50534c2c37e8a0a2c3ccadf7c2fe97a6 88156 libs optional
gnutls28_3.3.8-4.debian.tar.xz
d5ee931afb72cfc18a08782b9ed4f97a 679268 libdevel optional
libgnutls28-dev_3.3.8-4_i386.deb
90eb59d1825ec8d089ae438dfa005565 708914 libs standard
libgnutls-deb0-28_3.3.8-4_i386.deb
ee93f219bd37ed540a907d4451fe4b17 1915472 debug extra
libgnutls28-dbg_3.3.8-4_i386.deb
2c7960696ca6eb811bc0ce5cb2e96c36 309878 net optional
gnutls-bin_3.3.8-4_i386.deb
ed28f6644b31f30396ca34cb6b48590f 3625982 doc optional
gnutls-doc_3.3.8-4_all.deb
af91c7e1e36595014d3a96b48ec92d58 174350 lisp optional
guile-gnutls_3.3.8-4_i386.deb
160035c9a1b25ab69d23f4d4fb5cbc01 15432 libs extra
libgnutlsxx28_3.3.8-4_i386.deb
163be982b7c926e962808603ad78fef4 141894 libs standard
libgnutls-openssl27_3.3.8-4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=TdIx
-----END PGP SIGNATURE-----
--- End Message ---