Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:0348-1

Опубликовано: 01 фев. 2017
Источник: suse-cvrf

Описание

Security update for gnutls

This update for gnutls fixes the following security issues:

  • GnuTLS could have crashed when processing maliciously crafted OpenPGP certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337, CVE-2017-5336)
  • GnuTLS could have falsely accepted certificates when using OCSP (GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)
  • GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert packets during the handshake (bsc#1005879, CVE-2016-8610)

Список пакетов

SUSE Linux Enterprise Desktop 12 SP1
gnutls-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP2
gnutls-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Server 12 SP1
gnutls-3.2.15-16.1
libgnutls-openssl27-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Server 12 SP2
gnutls-3.2.15-16.1
libgnutls-openssl27-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
gnutls-3.2.15-16.1
libgnutls-openssl27-3.2.15-16.1
libgnutls28-3.2.15-16.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
gnutls-3.2.15-16.1
libgnutls-openssl27-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
gnutls-3.2.15-16.1
libgnutls-openssl27-3.2.15-16.1
libgnutls28-3.2.15-16.1
libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Software Development Kit 12 SP1
libgnutls-devel-3.2.15-16.1
libgnutls-openssl-devel-3.2.15-16.1
libgnutlsxx-devel-3.2.15-16.1
libgnutlsxx28-3.2.15-16.1
SUSE Linux Enterprise Software Development Kit 12 SP2
libgnutls-devel-3.2.15-16.1
libgnutls-openssl-devel-3.2.15-16.1
libgnutlsxx-devel-3.2.15-16.1
libgnutlsxx28-3.2.15-16.1

Описание

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1

Ссылки

Описание

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1

Ссылки

Описание

The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1

Ссылки

Описание

Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1

Ссылки

Описание

Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1
SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1

Ссылки