Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:0675-1

Опубликовано: 03 июн. 2014
Источник: suse-cvrf

Описание

Security update for gnutls

GnuTLS has been patched to ensure proper parsing of session ids during the TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have been fixed.

Further information is available at http://www.gnutls.org/security.html#GNUTLS-SA-2014-3 http://www.gnutls.org/security.html#GNUTLS-SA-2014-3

These security issues have been fixed:

* Possible memory corruption during connect (CVE-2014-3466) * Multiple boundary check issues could allow DoS (CVE-2014-3467) * asn1_get_bit_der() can return negative bit length (CVE-2014-3468) * Possible DoS by NULL pointer dereference (CVE-2014-3469)

Security Issue references:

* CVE-2014-3466 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466>

Список пакетов

SUSE Linux Enterprise Desktop 11 SP3
gnutls-2.4.1-24.39.51.1
libgnutls26-2.4.1-24.39.51.1
libgnutls26-32bit-2.4.1-24.39.51.1
SUSE Linux Enterprise High Availability Extension 11 SP3
libgnutls-extra26-2.4.1-24.39.51.1
SUSE Linux Enterprise Server 11 SP3
gnutls-2.4.1-24.39.51.1
libgnutls-extra26-2.4.1-24.39.51.1
libgnutls26-2.4.1-24.39.51.1
libgnutls26-32bit-2.4.1-24.39.51.1
libgnutls26-x86-2.4.1-24.39.51.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
gnutls-2.4.1-24.39.51.1
libgnutls-extra26-2.4.1-24.39.51.1
libgnutls26-2.4.1-24.39.51.1
libgnutls26-32bit-2.4.1-24.39.51.1
libgnutls26-x86-2.4.1-24.39.51.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3
gnutls-2.4.1-24.39.51.1
libgnutls-extra26-2.4.1-24.39.51.1
libgnutls26-2.4.1-24.39.51.1
libgnutls26-32bit-2.4.1-24.39.51.1
libgnutls26-x86-2.4.1-24.39.51.1
SUSE Linux Enterprise Software Development Kit 11 SP3
libgnutls-devel-2.4.1-24.39.51.1
libgnutls-extra-devel-2.4.1-24.39.51.1
libgnutls-extra26-2.4.1-24.39.51.1
SUSE Manager 1.7
gnutls-2.4.1-24.39.51.1
libgnutls-extra26-2.4.1-24.39.51.1
libgnutls26-2.4.1-24.39.51.1
libgnutls26-32bit-2.4.1-24.39.51.1

Описание

GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1
SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1

Ссылки

Описание

The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an incorrect fix for CVE-2013-0169.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1
SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1

Ссылки

Описание

lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1
SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1

Ссылки

Описание

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1
SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1

Ссылки

Описание

GnuTLS before 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle attackers to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1
SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1

Ссылки

Описание

GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1
SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1

Ссылки

Описание

GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1
SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1
SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1

Ссылки
Уязвимость SUSE-SU-2015:0675-1