Bug 1561481
Summary: | Rebase gnutls to upstream version 3.3.29 | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Stanislav Zidek <szidek> |
Component: | gnutls | Assignee: | Nikos Mavrogiannopoulos <nmavrogi> |
Status: | CLOSED ERRATA | QA Contact: | Stanislav Zidek <szidek> |
Severity: | medium | Docs Contact: | Mirek Jahoda <mjahoda> |
Priority: | high | ||
Version: | 7.5 | CC: | ansasaki, mjahoda, mthacker, szidek |
Target Milestone: | rc | Keywords: | Rebase |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | gnutls-3.3.29-5.el7 | Doc Type: | Rebase: Bug Fixes and Enhancements |
Doc Text: |
_gnutls_ rebased to 3.3.29
The GNU Transport Layer Security (GnuTLS) library has been upgraded to upstream version 3.3.29, which provides a number of bug fixes and enhancements over the previous version. Notable changes include:
* Improved the PKCS#11 cryptographic token interface for hardware security modules (HSMs): added DSA support in *p11tool* and fixed key import in certain Atos HSMs.
* Improved counter-measures for the TLS Cipher Block Chaining (CBC) record padding. The previous counter-measures had certain issues and were insufficient when the attacker had access to the CPU cache and performed a chosen-plaintext attack (CPA).
* Disabled the legacy `HMAC-SHA384` cipher suites by default.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2018-10-30 07:56:55 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1375307, 1434091, 1444792, 1460125, 1464896, 1542461, 1589704, 1589707, 1589708 | ||
Bug Blocks: | 1561450 |
Description
Stanislav Zidek
2018-03-28 12:19:29 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2018:3050 |