[MacPorts] #43865: gnutls 3.3.3

MacPorts noreply at macports.org
Sun Jun 1 08:48:14 PDT 2014


#43865: gnutls 3.3.3
----------------------------+--------------------------------
 Reporter:  mschamschula@…  |      Owner:  macports-tickets@…
     Type:  update          |     Status:  new
 Priority:  Normal          |  Milestone:
Component:  ports           |    Version:  2.3.0
 Keywords:                  |       Port:  gnutls
----------------------------+--------------------------------
 gnutls has been updated to address CVE-2014-3466:

 {{{
 A flaw was found in the way GnuTLS parsed session ids from Server Hello
 packets of the TLS/SSL handshake.  A malicious server could use this flaw
 to send an excessively long session id value and trigger a buffer overflow
 in a connecting TLS/SSL client using GnuTLS, causing it to crash or,
 possibly, execute arbitrary code.

 The flaw is in read_server_hello() / _gnutls_read_server_hello(), where
 session_id_len is checked to not exceed incoming packet size, but not
 checked to ensure it does not exceed maximum session id length:
 https://www.gitorious.org/gnutls/gnutls/source/8d7d6c6:lib/gnutls_handshake.c#L1747
 }}}

 MacPorts still is using the outdated 3.1.x branch. I've updated gnutls to
 the current stable 3.3.x. branch.

-- 
Ticket URL: <https://trac.macports.org/ticket/43865>
MacPorts <http://www.macports.org/>
Ports system for OS X


More information about the macports-tickets mailing list