Your message dated Wed, 12 Nov 2014 20:27:23 +0100
with message-id <[email protected]>
and subject line Fixed in 3.3.10 (experimental)
has caused the Debian Bug report #769154,
regarding gnutls28: CVE-2014-8564: Heap corruption when generating key ID for 
ECC (GNUTLS-SA-2014-5)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
769154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769154
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: gnutls28
Version: 3.3.8-3
Severity: grave
Tags: security upstream patch fixed-upstream

Hi,

the following vulnerability was published for gnutls28.

CVE-2014-8564[0]:
Heap corruption when generating key ID for ECC (GNUTLS-SA-2014-5)

| An out-of-bounds memory write flaw was found in the way GnuTLS parsed
| certain ECC (Elliptic Curve Cryptography) certificates or certificate
| signing requests (CSR). A malicious user could create a specially
| crafted ECC certificate or a certificate signing request that, when
| processed by an application compiled against GnuTLS (for example,
| certtool), could cause that application to crash or execute arbitrary
| code with the permissions of the user running the application.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2014-8564
[1] http://www.gnutls.org/security.html#GNUTLS-SA-2014-5
[2] 
https://gitorious.org/gnutls/gnutls/commit/e821e1908686657a45c1b735f6d077b7a8493e2b
(3.3.x branch)

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Version: 3.3.10-1
Distribution: experimental
Urgency: medium
Date: Mon, 10 Nov 2014 19:29:30 +0100

gnutls28 (3.3.10-1) experimental; urgency=medium
.
  * debian/rules: fix pattern for removal (and re-generation) of autogen-ed
    manpages.
  * New upstream version.
    + Includes fix for a denial of service issue CVE-2014-8564 /
      GNUTLS-SA-2014-5.
    + When gnutls_global_init() is called for a second time, it will check
      whether the /dev/urandom fd kept is still open and matches the original
      one. That behavior works around issues with servers that close all file
      descriptors. This should take care of #760476.

--- End Message ---

Reply via email to