gnutls: security bump to version 3.2.20
authorGustavo Zacarias <gustavo@zacarias.com.ar>
Mon, 10 Nov 2014 12:48:01 +0000 (09:48 -0300)
committerPeter Korsgaard <peter@korsgaard.com>
Mon, 10 Nov 2014 13:13:49 +0000 (14:13 +0100)
Fixes:
CVE-2014-8564 / GNUTLS-SA-2014-5 - Sean Burford reported that the
encoding of elliptic curves parameters GnuTLS 3 is vulnerable to a
denial of service (heap corruption). It affects clients and servers
which print information about the peer's certificate, e.g., the key ID,
and can be exploited via a specially crafted X.509 certificate.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/gnutls/gnutls.hash
package/gnutls/gnutls.mk

index ca743a8f057fb0ca505c134c6c2b6f935f6897bd..e0124d3e049575068c0239c08221b7e0737ca0ff 100644 (file)
@@ -1,2 +1,2 @@
 # Locally calculated after checking pgp signature
-sha256 a20d95a434a670afe5ce66430ae56151bbbe14456a0517ce775c46b1d4183dcf        gnutls-3.2.19.tar.xz
+sha256 7967057e78c3ed968e524a07ab262681219b73001ab8e75cbc4f1a506abdb598        gnutls-3.2.20.tar.xz
index efc933eee74e09c628e469f2ce2231adeb18ce98..06ca26554f0b1fabf5a8fcec1ce8f1bc7a00e2f6 100644 (file)
@@ -5,7 +5,7 @@
 ################################################################################
 
 GNUTLS_VERSION_MAJOR = 3.2
-GNUTLS_VERSION = $(GNUTLS_VERSION_MAJOR).19
+GNUTLS_VERSION = $(GNUTLS_VERSION_MAJOR).20
 GNUTLS_SOURCE = gnutls-$(GNUTLS_VERSION).tar.xz
 GNUTLS_SITE = ftp://ftp.gnutls.org/gcrypt/gnutls/v$(GNUTLS_VERSION_MAJOR)
 GNUTLS_LICENSE = GPLv3+ LGPLv2.1+