Описание
ELSA-2014-0595: gnutls security update (IMPORTANT)
[2.8.5-14]
- fix session ID length check (#1102024)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
gnutls
2.8.5-14.el6_5
gnutls-devel
2.8.5-14.el6_5
gnutls-guile
2.8.5-14.el6_5
gnutls-utils
2.8.5-14.el6_5
Oracle Linux i686
gnutls
2.8.5-14.el6_5
gnutls-devel
2.8.5-14.el6_5
gnutls-guile
2.8.5-14.el6_5
gnutls-utils
2.8.5-14.el6_5
Связанные CVE
Связанные уязвимости
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
Buffer overflow in the read_server_hello function in lib/gnutls_handsh ...
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.