[gnutls-dev] GnuTLS 1.2.10 - Security release
jas at extundo.com
Thu Feb 9 16:46:28 CET 2006
We are pleased to announce the availability of GnuTLS version 1.2.10,
a security bug-fix release on the stable 1.2.x branch.
This release fixes several serious bugs that would make the DER
decoder in libtasn1 crash on invalid input. The problems were
reported by Evgeny Legerov on the 31th of January.
We invite more detailed analysis of the problem, following our general
security advisory approach explained on:
Particularly, it would be useful to answer the question of whether
these bugs are possible to exploit remotely. It is certainly possible
to cause the server to crash. We don't have resources to investigate
this problem more ourselves currently.
To make it easier for you to review this problem, I have prepared a
self test that trigger three bugs in the old libtasn1. It will be
part of GnuTLS 1.3.4, in tests/certder.c. A diff between libtasn1
0.2.17 and libtasn1 0.2.18 is also available, for those wishing to
analyze the changes made to address the problems. It contains a few
unrelated fixes too, but it is not too large. It is available from:
Please send your analysis to gnutls-dev at gnupg.org and I'll update the
security advisory web page pointing to it.
GnuTLS is a modern C library that implement the standard network
security protocol Transport Layer Security (TLS), for use by network
Noteworthy changes since version 1.2.9:
- Fix read out bounds bug in DER parser. Reported by Evgeny Legerov
<admin at gleg.net>, and debugging help from Protover SSL.
- Libtasn1 0.2.18 is now required (contains the previous bug fix).
The included version has been updated too.
- Fix gnutls-cli STARTTLS hang when SIGINT is sent too quickly, thanks to
Otto Maddox <ottomaddox at fastmail.fm> and Nozomu Ando <nand at mac.com>.
- Corrected a bug in certtool for 64 bit machines. Reported
by Max Kellermann <max at duempel.org>.
- Corrected bugs in gnutls_certificate_set_x509_crl() and
gnutls_certificate_set_x509_trust(), that caused memory corruption if
more than one certificates were added. Report and patch by Max Kellermann.
- Fixed bug in non-blocking gnutls_bye(). gnutls_record_send() will no
longer invalidate a session if the underlying send fails, but it will
prevent future writes. That is to allow reading the already received data.
Patches and bug reports by Yoann Vandoorselaere <yoann at prelude-ids.org>
Improving GnuTLS is costly, but you can help! We are looking for
organizations that find GnuTLS useful and wish to contribute back.
You can contribute by reporting bugs, improve the software, or donate
money or equipment.
Commercial support contracts for GnuTLS are available, and they help
finance continued maintenance. Simon Josefsson Datakonsult, a
Stockholm based privately held company, is currently funding GnuTLS
maintenance. We are always looking for interesting development
If you need help to use GnuTLS, or want to help others, you are
invited to join our help-gnutls mailing list, see:
The project page of the library is available at:
http://josefsson.org/gnutls/ (updated fastest)
Here are the compressed sources:
Here are GPG detached signatures signed using key 0xB565716F:
The software is cryptographically signed by the author using an
OpenPGP key identified by the following information:
1280R/B565716F 2002-05-05 [expires: 2006-02-28]
Key fingerprint = 0424 D4EE 81A0 E3D1 19C6 F835 EDA2 1E94 B565 716F
The key is available from:
Here are the build reports for various platforms:
Here are the SHA-1 checksums:
Nikos and Simon
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 423 bytes
Desc: not available
Url : /pipermail/attachments/20060209/044258c5/attachment.pgp
More information about the Gnutls-dev