SUSE Security Update: Security update for GnuTLS
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0758-2
Rating:             important
References:         #880730 #880910 
Cross-References:   CVE-2014-3466
Affected Products:
                    SUSE Manager 1.7 for SLE 11 SP2
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:


   GnuTLS has been patched to ensure proper parsing of session ids during the
   TLS/SSL handshake. Additionally three issues inherited from libtasn1 have
   been fixed.

   Further information is available at
   http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
   

   These security issues have been fixed:

       * Possible memory corruption during connect (CVE-2014-3466)
       * Multiple boundary check issues could allow DoS (CVE-2014-3467)
       * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
       * Possible DoS by NULL pointer dereference (CVE-2014-3469)

   Security Issue references:

       * CVE-2014-3466
         


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Manager 1.7 for SLE 11 SP2:

      zypper in -t patch sleman17sp2-gnutls-9319

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Manager 1.7 for SLE 11 SP2 (x86_64):

      gnutls-2.4.1-24.39.51.1
      libgnutls-extra26-2.4.1-24.39.51.1
      libgnutls26-2.4.1-24.39.51.1
      libgnutls26-32bit-2.4.1-24.39.51.1


References:

   https://www.suse.com/security/cve/CVE-2014-3466.html
   https://bugzilla.novell.com/880730
   https://bugzilla.novell.com/880910
   https://scc.suse.com:443/patches/

SuSE: 2014:0758-2: important: GnuTLS

June 13, 2014
An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata is ...

Summary

GnuTLS has been patched to ensure proper parsing of session ids during the TLS/SSL handshake. Additionally three issues inherited from libtasn1 have been fixed. Further information is available at http://www.gnutls.org/security.html#GNUTLS-SA-2014-3 These security issues have been fixed: * Possible memory corruption during connect (CVE-2014-3466) * Multiple boundary check issues could allow DoS (CVE-2014-3467) * asn1_get_bit_der() can return negative bit length (CVE-2014-3468) * Possible DoS by NULL pointer dereference (CVE-2014-3469) Security Issue references: * CVE-2014-3466 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-gnutls-9319 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1...

Read the Full Advisory

References

#880730 #880910

Cross- CVE-2014-3466

Affected Products:

SUSE Manager 1.7 for SLE 11 SP2

https://www.suse.com/security/cve/CVE-2014-3466.html

https://bugzilla.novell.com/880730

https://bugzilla.novell.com/880910

https://scc.suse.com:443/patches/

Severity
Announcement ID: SUSE-SU-2014:0758-2
Rating: important

Related News