[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-disclosure] [ MDVSA-2009:210 ] gnutls



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:210
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : gnutls
 Date    : August 20, 2009
 Affected: 2008.1, 2009.0, 2009.1, Corporate 4.0, Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability have been discovered and corrected in GnuTLS
 before 2.8.2, which could allow man-in-the-middle attackers to spoof
 arbitrary SSL servers via a crafted certificate issued by a legitimate
 Certification Authority (CVE-2009-2730).
 
 This update fixes this vulnerability.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2730
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 8f25af9dcaefbf23e1ed7479a9611c13  
2008.1/i586/gnutls-2.3.0-3.5mdv2008.1.i586.rpm
 2f53d53b692d78f0ee65afeb5393f1ae  
2008.1/i586/libgnutls26-2.3.0-3.5mdv2008.1.i586.rpm
 3bc7b6ca54f3d8c0736966504d3d3eff  
2008.1/i586/libgnutls-devel-2.3.0-3.5mdv2008.1.i586.rpm 
 27fab203d4f153b5c14b34547ba86d49  
2008.1/SRPMS/gnutls-2.3.0-3.5mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 7404cec905b6adb5083953a50588e5e6  
2008.1/x86_64/gnutls-2.3.0-3.5mdv2008.1.x86_64.rpm
 8d8b6532d22127ff20b5899716d7146b  
2008.1/x86_64/lib64gnutls26-2.3.0-3.5mdv2008.1.x86_64.rpm
 aeaeed844fb7a7650906ebfaf178ff20  
2008.1/x86_64/lib64gnutls-devel-2.3.0-3.5mdv2008.1.x86_64.rpm 
 27fab203d4f153b5c14b34547ba86d49  
2008.1/SRPMS/gnutls-2.3.0-3.5mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 2855a45403f0a7292a469f8573476002  
2009.0/i586/gnutls-2.4.1-2.5mdv2009.0.i586.rpm
 ebb2a3125ba6472a6a9b5c0fdab2adcd  
2009.0/i586/libgnutls26-2.4.1-2.5mdv2009.0.i586.rpm
 d06b405f95ffb80522360d094ca6b957  
2009.0/i586/libgnutls-devel-2.4.1-2.5mdv2009.0.i586.rpm 
 8ba44446f8da6e5882b136be9032530b  
2009.0/SRPMS/gnutls-2.4.1-2.5mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 d1d6f6e9b23cfd422f92c96e70056bc9  
2009.0/x86_64/gnutls-2.4.1-2.5mdv2009.0.x86_64.rpm
 31b1a501f3f733cb9e31c95fd4a13a30  
2009.0/x86_64/lib64gnutls26-2.4.1-2.5mdv2009.0.x86_64.rpm
 e0768bff88400770bbf7fd439b3840f1  
2009.0/x86_64/lib64gnutls-devel-2.4.1-2.5mdv2009.0.x86_64.rpm 
 8ba44446f8da6e5882b136be9032530b  
2009.0/SRPMS/gnutls-2.4.1-2.5mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 bb9cb293b88cbee46796950fd2263d6d  
2009.1/i586/gnutls-2.6.4-1.3mdv2009.1.i586.rpm
 03c6fedc1895aed56edef3d1d705c3d1  
2009.1/i586/libgnutls26-2.6.4-1.3mdv2009.1.i586.rpm
 bab68af73a4824410b1f46a36723ba73  
2009.1/i586/libgnutls-devel-2.6.4-1.3mdv2009.1.i586.rpm 
 3979e6cdf9461ddfe4bc281583dd3d16  
2009.1/SRPMS/gnutls-2.6.4-1.3mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 9f07205b1ec7fe4a69ca5418643c2b9a  
2009.1/x86_64/gnutls-2.6.4-1.3mdv2009.1.x86_64.rpm
 a71159cef93cfdf2ae80a37705ee9a7b  
2009.1/x86_64/lib64gnutls26-2.6.4-1.3mdv2009.1.x86_64.rpm
 0fe993d2682745a7e4e3d46a2efe7c8e  
2009.1/x86_64/lib64gnutls-devel-2.6.4-1.3mdv2009.1.x86_64.rpm 
 3979e6cdf9461ddfe4bc281583dd3d16  
2009.1/SRPMS/gnutls-2.6.4-1.3mdv2009.1.src.rpm

 Corporate 4.0:
 09bedb546faeac75a452b763c27f9bf0  
corporate/4.0/i586/gnutls-1.0.25-2.5.20060mlcs4.i586.rpm
 5e72278b5cd3c27088450471cc406fe6  
corporate/4.0/i586/libgnutls11-1.0.25-2.5.20060mlcs4.i586.rpm
 cb0bb76ae2e66750076aebbd1c7cf2b7  
corporate/4.0/i586/libgnutls11-devel-1.0.25-2.5.20060mlcs4.i586.rpm 
 b99927b8c06333d2fc3b025719a9aea3  
corporate/4.0/SRPMS/gnutls-1.0.25-2.5.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 31d7f354bf1ad71f45330fea8550688b  
corporate/4.0/x86_64/gnutls-1.0.25-2.5.20060mlcs4.x86_64.rpm
 7ea85fe5e8929334971aa3654e6167ac  
corporate/4.0/x86_64/lib64gnutls11-1.0.25-2.5.20060mlcs4.x86_64.rpm
 e3bccba96d6cc7e1d3b2b9f942bc99a2  
corporate/4.0/x86_64/lib64gnutls11-devel-1.0.25-2.5.20060mlcs4.x86_64.rpm 
 b99927b8c06333d2fc3b025719a9aea3  
corporate/4.0/SRPMS/gnutls-1.0.25-2.5.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 8e389b0ba59e759989619a85e86d12e0  mes5/i586/gnutls-2.4.1-2.5mdvmes5.i586.rpm
 82b0a901986a76f14a62acf3fba7e4bd  
mes5/i586/libgnutls26-2.4.1-2.5mdvmes5.i586.rpm
 dd145f04f76282c401a7360f69b04039  
mes5/i586/libgnutls-devel-2.4.1-2.5mdvmes5.i586.rpm 
 6abb8ee215ea3e05ca1a296155d8fe3f  mes5/SRPMS/gnutls-2.4.1-2.5mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 e0170272a46d84626ac93c55c3afe0ac  
mes5/x86_64/gnutls-2.4.1-2.5mdvmes5.x86_64.rpm
 1e376c29b842f9915a2b75396938fe26  
mes5/x86_64/lib64gnutls26-2.4.1-2.5mdvmes5.x86_64.rpm
 43fb2ca23a17a052d54ebcbac35282ee  
mes5/x86_64/lib64gnutls-devel-2.4.1-2.5mdvmes5.x86_64.rpm 
 6abb8ee215ea3e05ca1a296155d8fe3f  mes5/SRPMS/gnutls-2.4.1-2.5mdvmes5.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKjeggmqjQ0CJFipgRAuYNAKCHRb92bFh5h8ziPaXu7Y29yApbwQCfSTTo
AIYtlv2HLQO1sMVHErI8F5s=
=5TBi
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/