From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 55344 invoked by alias); 10 Mar 2017 22:01:19 -0000 Mailing-List: contact cygwin-apps-help@cygwin.com; run by ezmlm Precedence: bulk Sender: cygwin-apps-owner@cygwin.com List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Mail-Followup-To: cygwin-apps@cygwin.com Received: (qmail 55311 invoked by uid 89); 10 Mar 2017 22:01:16 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.1 required=5.0 tests=AWL,BAYES_00,KAM_LAZY_DOMAIN_SECURITY,SPF_HELO_PASS autolearn=no version=3.3.2 spammy=overdue, H*M:cygwin X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 10 Mar 2017 22:01:15 +0000 Received: from int-mx14.intmail.prod.int.phx2.redhat.com (int-mx14.intmail.prod.int.phx2.redhat.com [10.5.11.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id EF317C05680F for ; Fri, 10 Mar 2017 22:01:15 +0000 (UTC) Received: from [10.10.124.208] (ovpn-124-208.rdu2.redhat.com [10.10.124.208] (may be forged)) by int-mx14.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id v2AM1EN5024385 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 10 Mar 2017 17:01:15 -0500 Subject: Re: [SECURITY] gnutls To: cygwin-apps@cygwin.com References: From: Yaakov Selkowitz Message-ID: <2a005d15-9f33-46e9-bd12-484702e15a52@cygwin.com> Date: Fri, 10 Mar 2017 22:01:00 -0000 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-IsSubscribed: yes X-SW-Source: 2017-03/txt/msg00005.txt.bz2 On 2017-02-22 12:46, Yaakov Selkowitz wrote: > On 2016-09-26 14:13, Yaakov Selkowitz wrote: >> On 2016-09-26 02:00, Yaakov Selkowitz wrote: >>> Dr. Volker, >>> >>> Two security issues have been reported in GnuTLS: >>> >>> https://www.gnutls.org/security.html#GNUTLS-SA-2016-2 >>> https://www.gnutls.org/security.html#GNUTLS-SA-2016-3 >>> >>> At this point, I think the best way to proceed would be to: >>> >>> 1) release 3.3.24 with the patch for the latter, then; >>> 2) update to 3.4.15, which involves an ABI break. >> >> nettle is also overdue for an update (it's also blocking an update to >> filezilla); getting that in after 3.3.24 and prior to 3.4 would be best. > > Ping? More vulnerabilities have been announced, so we need to revise > the above to 3.3.26 and 3.5.9. Ping 2? -- Yaakov