All errata/c8.1/ALT-PU-2018-2929-1
ALT-PU-2018-2929-1

Package update gnutls30 in branch c8.1

Version3.6.5-alt1.M80P.1
Published2018-12-20
Max severityHIGH
Severity:

Closed issues (4)

BDU:2019-00776
MEDIUM4.7

Уязвимость криптографической библиотеки GnuTLS, связанная с ошибкой проверки дешифрованных данных RSA, позволяющая нарушителю получить доступ к защищаемой информации

Published: 2019-02-26Modified: 2021-03-23
CVSS 3.xMEDIUM 4.7
CVSS:3.x/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
CVSS 2.0LOW 3.7
CVSS:2.0/AV:L/AC:H/Au:M/C:C/I:N/A:N
References
CVE-2017-7507
HIGH7.5

GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.

Published: 2017-06-16Modified: 2025-04-20
CVSS 2.0MEDIUM 5.0
CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 3.xHIGH 7.5
CVSS:3.x/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2017-7869
HIGH7.5

GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.

Published: 2017-04-14Modified: 2025-04-20
CVSS 2.0MEDIUM 5.0
CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 3.xHIGH 7.5
CVSS:3.x/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2018-16868
MEDIUM5.6

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

Published: 2018-12-03Modified: 2024-11-21
CVSS 2.0LOW 3.3
CVSS:2.0/AV:L/AC:M/Au:N/C:P/I:P/A:N
CVSS 3.xMEDIUM 5.6
CVSS:3.x/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N

Closed bugs (2)

Собрать модуль для guile в подпакет gnutls-guile

Рассмотреть вопрос об обновлении gnutls до версии 3.6.3 с поддержкой ГОСТ-овой криптографии