SuSE: 2014:0320-1: critical: gnutls
Summary
The GnuTLS library received a critical security fix and other updates: * CVE-2014-0092: The X.509 certificate verification had incorrect error handling, which could lead to broken certificates marked as being valid. * CVE-2009-5138: A verification problem in handling V1 certificates could also lead to V1 certificates incorrectly being handled. * CVE-2013-2116: The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS allowed remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. * CVE-2013-1619: The TLS implementation in GnuTLS did not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169. (Luc...
Read the Full AdvisoryReferences
#536809 #554084 #659128 #739898 #753301 #754223
#802651 #821818 #865804 #865993
Cross- CVE-2009-5138 CVE-2011-4108 CVE-2012-0390
CVE-2012-1569 CVE-2012-1573 CVE-2013-0169
CVE-2013-1619 CVE-2013-2116 CVE-2014-0092
Affected Products:
SUSE Linux Enterprise Server 10 SP3 LTSS
https://www.suse.com/security/cve/CVE-2009-5138.html
https://www.suse.com/security/cve/CVE-2011-4108.html
https://www.suse.com/security/cve/CVE-2012-0390.html
https://www.suse.com/security/cve/CVE-2012-1569.html
https://www.suse.com/security/cve/CVE-2012-1573.html
https://www.suse.com/security/cve/CVE-2013-0169.html
https://www.suse.com/security/cve/CVE-2013-1619.html
https://www.suse.com/security/cve/CVE-2013-2116.html
https://www.suse.com/security/cve/CVE-2014-0092.html
https://bugzilla.novell.com/536809
https://bugzilla.novell.com/554084
https://bugzilla.novell.com/659128
https://bu...
Read the Full Advisory