gnutls: security bump to version 3.5.13
authorBaruch Siach <baruch@tkos.co.il>
Wed, 14 Jun 2017 18:18:34 +0000 (21:18 +0300)
committerPeter Korsgaard <peter@korsgaard.com>
Wed, 14 Jun 2017 19:24:08 +0000 (21:24 +0200)
Fixes CVE-2017-7507: decoding a status request TLS extension that has a
non-empty responder IDs list could lead to a crash due to a null pointer
dereference.

https://lists.gnupg.org/pipermail/gnutls-devel/2017-June/008446.html

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/gnutls/gnutls.hash
package/gnutls/gnutls.mk

index 8e2469a5bdfb837642c3e78d7eba32b29380ef94..f699716801c9be0e03b67ff0a6745327c56578a8 100644 (file)
@@ -1,2 +1,2 @@
 # Locally calculated after checking pgp signature
-sha256 63cb39a5eaa029381df2e49a74cfb7be89fc4a592445191818ffe1e66bde57cb        gnutls-3.5.12.tar.xz
+sha256 79f5480ad198dad5bc78e075f4a40c4a315a1b2072666919d2d05a08aec13096        gnutls-3.5.13.tar.xz
index c192469f9ea4420550498bd6ff0e9b4c26d896c4..3c76c30af888b7a9242e983525b00b33959f798e 100644 (file)
@@ -5,7 +5,7 @@
 ################################################################################
 
 GNUTLS_VERSION_MAJOR = 3.5
-GNUTLS_VERSION = $(GNUTLS_VERSION_MAJOR).12
+GNUTLS_VERSION = $(GNUTLS_VERSION_MAJOR).13
 GNUTLS_SOURCE = gnutls-$(GNUTLS_VERSION).tar.xz
 GNUTLS_SITE = ftp://ftp.gnutls.org/gcrypt/gnutls/v$(GNUTLS_VERSION_MAJOR)
 GNUTLS_LICENSE = LGPL-2.1+ (core library), GPL-3.0+ (gnutls-openssl library)