Print

Print


Synopsis:          Moderate: gnutls security, bug fix, and enhancement 
Advisory ID:       SLSA-2017:2292-1
Issue Date:        2017-08-01
CVE Numbers:       CVE-2017-5337
                   CVE-2017-5335
                   CVE-2017-5336
                   CVE-2016-7444
                   CVE-2017-5334
                   CVE-2017-7869
                   CVE-2017-7507
--

The following packages have been upgraded to a later upstream version:
gnutls (3.3.26).

Security Fix(es):

* A double-free flaw was found in the way GnuTLS parsed certain X.509
certificates with Proxy Certificate Information extension. An attacker
could create a specially-crafted certificate which, when processed by an
application compiled against GnuTLS, could cause that application to
crash. (CVE-2017-5334)

* Multiple flaws were found in the way gnutls processed OpenPGP
certificates. An attacker could create specially crafted OpenPGP
certificates which, when parsed by gnutls, would cause it to crash.
(CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-7869)

* A null pointer dereference flaw was found in the way GnuTLS processed
ClientHello messages with status_request extension. A remote attacker
could use this flaw to cause an application compiled with GnuTLS to crash.
(CVE-2017-7507)

* A flaw was found in the way GnuTLS validated certificates using OCSP
responses. This could falsely report a certificate as valid under certain
circumstances. (CVE-2016-7444)
--

SL7
  x86_64
    gnutls-3.3.26-9.el7.i686.rpm
    gnutls-3.3.26-9.el7.x86_64.rpm
    gnutls-dane-3.3.26-9.el7.i686.rpm
    gnutls-dane-3.3.26-9.el7.x86_64.rpm
    gnutls-debuginfo-3.3.26-9.el7.i686.rpm
    gnutls-debuginfo-3.3.26-9.el7.x86_64.rpm
    gnutls-utils-3.3.26-9.el7.x86_64.rpm
    gnutls-c++-3.3.26-9.el7.i686.rpm
    gnutls-c++-3.3.26-9.el7.x86_64.rpm
    gnutls-devel-3.3.26-9.el7.i686.rpm
    gnutls-devel-3.3.26-9.el7.x86_64.rpm

- Scientific Linux Development Team