SCIENTIFIC-LINUX-ERRATA Archives

May 2008

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
Security Errata for Scientific Linux <[log in to unmask]>
Date:
Tue, 20 May 2008 15:37:42 -0500
MIME-version:
1.0
Reply-To:
Troy Dawson <[log in to unmask]>
Content-type:
text/plain; format=flowed; charset=ISO-8859-1
Subject:
From:
Troy Dawson <[log in to unmask]>
Content-transfer-encoding:
7BIT
Comments:
Parts/Attachments:
text/plain (32 lines)
Synopsis:	Critical: gnutls security update
Issue date:	2008-05-20
CVE Names:	CVE-2008-1948 CVE-2008-1949 CVE-2008-1950

Flaws were found in the way GnuTLS handles malicious client connections. A
malicious remote client could send a specially crafted request to a service
using GnuTLS that could cause the service to crash. (CVE-2008-1948,
CVE-2008-1949, CVE-2008-1950)

At this time we have not seen any code that is using this exploit.  But in 
Scientific Linux 5 there are some applications, such as CUPS, that would be 
directly vulnerable if/when there is an exploit.  Because of the potential 
threat we are labeling this critical.

SL 5.x

    SRPMS:
gnutls-1.4.1-3.el5_1.src.rpm
    i386:
gnutls-1.4.1-3.el5_1.i386.rpm
gnutls-devel-1.4.1-3.el5_1.i386.rpm
gnutls-utils-1.4.1-3.el5_1.i386.rpm
    x86_64:
gnutls-1.4.1-3.el5_1.i386.rpm
gnutls-1.4.1-3.el5_1.x86_64.rpm
gnutls-devel-1.4.1-3.el5_1.i386.rpm
gnutls-devel-1.4.1-3.el5_1.x86_64.rpm
gnutls-utils-1.4.1-3.el5_1.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2