Slackware: 2019-086-01: gnutls Security Update
Summary
Here are the details from the Slackware 14.2 ChangeLog: patches/packages/gnutls-3.6.7-i586-1_slack14.2.txz: Upgraded. Fixes security issues: libgnutls, gnutls tools: Every gnutls_free() will automatically set the free'd pointer to NULL. This prevents possible use-after-free and double free issues. Use-after-free will be turned into NULL dereference. The counter-measure does not extend to applications using gnutls_free(). libgnutls: Fixed a memory corruption (double free) vulnerability in the certificate verification API. Reported by Tavis Ormandy; addressed with the change above. [GNUTLS-SA-2019-03-27, #694] libgnutls: Fixed an invalid pointer access via malformed TLS1.3 async messages; Found using tlsfuzzer. [GNUTLS-SA-2019-03-27, #704] libgnutls: enforce key usage limitations on certificates more actively. Previously we would enforce it for TLS1.2 protocol, now we enforce it even when TLS1.3 is negotiated, or on client certificates as well. When an ina...
Where Find New Packages
Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.
Updated package for Slackware 14.2:
Updated package for Slackware x86_64 14.2:
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:
MD5 Signatures
Slackware 14.2 package:
6ce564c9fb38e84bceffcca584613117 gnutls-3.6.7-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
ad660f430e5873b0cf3a5ac78a9ecf68 gnutls-3.6.7-x86_64-1_slack14.2.txz
Slackware -current package:
af0f6c0601209ba99d39679d1085a917 n/gnutls-3.6.7-i586-1.txz
Slackware x86_64 -current package:
dd2b15db16bcfefe213c8acf012e07c6 n/gnutls-3.6.7-x86_64-1.txz
Installation Instructions
Installation instructions: Upgrade the package as root: # upgradepkg gnutls-3.6.7-i586-1_slack14.2.txz