SUSE Security Update: Security update for GnuTLS
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0800-1
Rating:             important
References:         #554084 #670152 #802651 #880730 #880910 
Cross-References:   CVE-2013-1619 CVE-2014-3466 CVE-2014-3467
                    CVE-2014-3468 CVE-2014-3469
Affected Products:
                    SUSE CORE 9
______________________________________________________________________________

   An update that fixes 5 vulnerabilities is now available.

Description:


   GnuTLS has been patched to ensure proper parsing of session ids during the
   TLS/SSL handshake. Additionally three issues inherited from libtasn1 have
   been fixed.

   Further information is available at
   http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
   

   These security issues have been fixed:

       * Possible memory corruption during connect (CVE-2014-3466)
       * Multiple boundary check issues could allow DoS (CVE-2014-3467)
       * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
       * Possible DoS by NULL pointer dereference (CVE-2014-3469)
       * Possible timing side-channel attack (Lucky 13) (CVE-2013-1619)

   One additional bug has been fixed:

       * Allow unsafe renegotiation (bnc#554084)

   Security Issue references:

       * CVE-2014-3466
         
       * CVE-2014-3467
         
       * CVE-2014-3468
         
       * CVE-2014-3469
         
       * CVE-2013-1619
         



Package List:

   - SUSE CORE 9 (i586 s390 s390x x86_64):

      gnutls-1.0.8-26.32
      gnutls-devel-1.0.8-26.32


References:

   https://www.suse.com/security/cve/CVE-2013-1619.html
   https://www.suse.com/security/cve/CVE-2014-3466.html
   https://www.suse.com/security/cve/CVE-2014-3467.html
   https://www.suse.com/security/cve/CVE-2014-3468.html
   https://www.suse.com/security/cve/CVE-2014-3469.html
   https://bugzilla.novell.com/554084
   https://bugzilla.novell.com/670152
   https://bugzilla.novell.com/802651
   https://bugzilla.novell.com/880730
   https://bugzilla.novell.com/880910
   https://scc.suse.com:443/patches/

SuSE: 2014:0800-1: important: GnuTLS

June 16, 2014
An update that fixes 5 vulnerabilities is now available

Summary

GnuTLS has been patched to ensure proper parsing of session ids during the TLS/SSL handshake. Additionally three issues inherited from libtasn1 have been fixed. Further information is available at http://www.gnutls.org/security.html#GNUTLS-SA-2014-3 These security issues have been fixed: * Possible memory corruption during connect (CVE-2014-3466) * Multiple boundary check issues could allow DoS (CVE-2014-3467) * asn1_get_bit_der() can return negative bit length (CVE-2014-3468) * Possible DoS by NULL pointer dereference (CVE-2014-3469) * Possible timing side-channel attack (Lucky 13) (CVE-2013-1619) One additional bug has been fixed: * Allow unsafe renegotiation (bnc#554084) Security Issue references: * CVE-2014-3466 * CVE-2014-3467 * CVE-2014-3468 * CVE-2014-3469 * CVE-2013-1619 Package List: - SUSE CORE 9 (i586 s...

Read the Full Advisory

References

#554084 #670152 #802651 #880730 #880910

Cross- CVE-2013-1619 CVE-2014-3466 CVE-2014-3467

CVE-2014-3468 CVE-2014-3469

Affected Products:

SUSE CORE 9

https://www.suse.com/security/cve/CVE-2013-1619.html

https://www.suse.com/security/cve/CVE-2014-3466.html

https://www.suse.com/security/cve/CVE-2014-3467.html

https://www.suse.com/security/cve/CVE-2014-3468.html

https://www.suse.com/security/cve/CVE-2014-3469.html

https://bugzilla.novell.com/554084

https://bugzilla.novell.com/670152

https://bugzilla.novell.com/802651

https://bugzilla.novell.com/880730

https://bugzilla.novell.com/880910

https://scc.suse.com:443/patches/

Severity
Announcement ID: SUSE-SU-2014:0800-1
Rating: important

Related News