SUSE Security Update: Security update for GnuTLS
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0788-1
Rating:             important
References:         #880730 #880910 
Cross-References:   CVE-2014-3466 CVE-2014-3467 CVE-2014-3468
                    CVE-2014-3469
Affected Products:
                    SUSE Linux Enterprise Server 11 SP2 LTSS
                    SUSE Linux Enterprise Server 11 SP1 LTSS
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:


   GnuTLS was patched to ensure proper parsing of session ids during the
   TLS/SSL handshake. Additionally three issues inherited from libtasn1 were
   fixed.

       * Possible memory corruption during connect. (CVE-2014-3466)
       * Multiple boundary check issues could allow DoS. (CVE-2014-3467)
       * asn1_get_bit_der() can return negative bit length. (CVE-2014-3468)
       * Possible DoS by NULL pointer dereference. (CVE-2014-3469)

   Further information is available at
   http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
    .

   Security Issues references:

       * CVE-2014-3466
         
       * CVE-2014-3467
         
       * CVE-2014-3468
         
       * CVE-2014-3469
         


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP2 LTSS:

      zypper in -t patch slessp2-gnutls-9352

   - SUSE Linux Enterprise Server 11 SP1 LTSS:

      zypper in -t patch slessp1-gnutls-9353

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):

      gnutls-2.4.1-24.39.53.1
      libgnutls-extra26-2.4.1-24.39.53.1
      libgnutls26-2.4.1-24.39.53.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64):

      libgnutls26-32bit-2.4.1-24.39.53.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):

      gnutls-2.4.1-24.39.53.1
      libgnutls-extra26-2.4.1-24.39.53.1
      libgnutls26-2.4.1-24.39.53.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64):

      libgnutls26-32bit-2.4.1-24.39.53.1


References:

   https://www.suse.com/security/cve/CVE-2014-3466.html
   https://www.suse.com/security/cve/CVE-2014-3467.html
   https://www.suse.com/security/cve/CVE-2014-3468.html
   https://www.suse.com/security/cve/CVE-2014-3469.html
   https://bugzilla.novell.com/880730
   https://bugzilla.novell.com/880910
   https://scc.suse.com:443/patches/
   https://scc.suse.com:443/patches/

SuSE: 2014:0788-1: important: GnuTLS

June 13, 2014
An update that fixes four vulnerabilities is now available

Summary

GnuTLS was patched to ensure proper parsing of session ids during the TLS/SSL handshake. Additionally three issues inherited from libtasn1 were fixed. * Possible memory corruption during connect. (CVE-2014-3466) * Multiple boundary check issues could allow DoS. (CVE-2014-3467) * asn1_get_bit_der() can return negative bit length. (CVE-2014-3468) * Possible DoS by NULL pointer dereference. (CVE-2014-3469) Further information is available at http://www.gnutls.org/security.html#GNUTLS-SA-2014-3 . Security Issues references: * CVE-2014-3466 * CVE-2014-3467 * CVE-2014-3468 * CVE-2014-3469 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-gnutls-9352 - SUSE Linux Enterprise Server ...

Read the Full Advisory

References

#880730 #880910

Cross- CVE-2014-3466 CVE-2014-3467 CVE-2014-3468

CVE-2014-3469

Affected Products:

SUSE Linux Enterprise Server 11 SP2 LTSS

SUSE Linux Enterprise Server 11 SP1 LTSS

https://www.suse.com/security/cve/CVE-2014-3466.html

https://www.suse.com/security/cve/CVE-2014-3467.html

https://www.suse.com/security/cve/CVE-2014-3468.html

https://www.suse.com/security/cve/CVE-2014-3469.html

https://bugzilla.novell.com/880730

https://bugzilla.novell.com/880910

https://scc.suse.com:443/patches/

https://scc.suse.com:443/patches/

Severity
Announcement ID: SUSE-SU-2014:0788-1
Rating: important

Related News