SuSE: 2014:0788-1: important: GnuTLS
Summary
GnuTLS was patched to ensure proper parsing of session ids during the
TLS/SSL handshake. Additionally three issues inherited from libtasn1 were
fixed.
* Possible memory corruption during connect. (CVE-2014-3466)
* Multiple boundary check issues could allow DoS. (CVE-2014-3467)
* asn1_get_bit_der() can return negative bit length. (CVE-2014-3468)
* Possible DoS by NULL pointer dereference. (CVE-2014-3469)
Further information is available at
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
References
#880730 #880910
Cross- CVE-2014-3466 CVE-2014-3467 CVE-2014-3468
CVE-2014-3469
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
SUSE Linux Enterprise Server 11 SP1 LTSS
https://www.suse.com/security/cve/CVE-2014-3466.html
https://www.suse.com/security/cve/CVE-2014-3467.html
https://www.suse.com/security/cve/CVE-2014-3468.html
https://www.suse.com/security/cve/CVE-2014-3469.html
https://bugzilla.novell.com/880730
https://bugzilla.novell.com/880910
https://scc.suse.com:443/patches/
https://scc.suse.com:443/patches/