Описание
Security update for gnutls
GnuTLS has been patched to ensure proper parsing of session ids during the TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have been fixed.
Further information is available at http://www.gnutls.org/security.html#GNUTLS-SA-2014-3 http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
These security issues have been fixed:
Security Issue references:
Список пакетов
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP3-TERADATA
SUSE Linux Enterprise Server for SAP Applications 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Manager 1.7
Ссылки
- Link for SUSE-SU-2015:0675-1
- E-Mail link for SUSE-SU-2015:0675-1
- SUSE Security Ratings
- SUSE Bug 821818
- SUSE Bug 835760
- SUSE Bug 865804
- SUSE Bug 865993
- SUSE Bug 880730
- SUSE Bug 880910
- SUSE Bug 919938
- SUSE Bug 921684
- SUSE CVE CVE-2009-5138 page
- SUSE CVE CVE-2013-2116 page
- SUSE CVE CVE-2014-0092 page
- SUSE CVE CVE-2014-3466 page
- SUSE CVE CVE-2014-8155 page
- SUSE CVE CVE-2015-0282 page
- SUSE CVE CVE-2015-0294 page
Описание
GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.
Затронутые продукты
Ссылки
- CVE-2009-5138
- SUSE Bug 865993
Описание
The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an incorrect fix for CVE-2013-0169.
Затронутые продукты
Ссылки
- CVE-2013-2116
- SUSE Bug 821818
Описание
lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
Затронутые продукты
Ссылки
- CVE-2014-0092
- SUSE Bug 865804
- SUSE Bug 915878
Описание
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
Затронутые продукты
Ссылки
- CVE-2014-3466
- SUSE Bug 880730
Описание
GnuTLS before 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle attackers to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.
Затронутые продукты
Ссылки
- CVE-2014-8155
- SUSE Bug 920366
Описание
GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2015-0282
- SUSE Bug 919938
- SUSE Bug 921684
Описание
GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
Затронутые продукты
Ссылки
- CVE-2015-0294
- SUSE Bug 919938