You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa gnutls

Sigurnosni nedostaci programskog paketa gnutls

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for gnutls
______________________________________________________________________________

Announcement ID: SUSE-SU-2014:0324-1
Rating: critical
References: #865804
Cross-References: CVE-2014-0092
Affected Products:
SUSE CORE 9
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

The GnuTLS library received a critical security fix:

* CVE-2014-0092: The X.509 certificate verification had
incorrect error handling, which could lead to broken
certificates marked as being valid.

Security Issue reference:

* CVE-2014-0092
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
>

Package List:

– SUSE CORE 9 (i586 s390 s390x x86_64):

gnutls-1.0.8-26.30
gnutls-devel-1.0.8-26.30

References:

http://support.novell.com/security/cve/CVE-2014-0092.html
https://bugzilla.novell.com/865804
http://download.novell.com/patch/finder/?keywords=f0ade0f71a1461cdf632f942531d7d41


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: gnutls: fixed SSL certificate validation problems
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0325-1
Rating: critical
References: #865804
Cross-References: CVE-2014-0092
Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

The gnutls library was updated to fixed x509 certificate
validation problems, where man-in-the-middle attackers
could hijack SSL connections.

This update also reenables Elliptic Curve support to meet
current day cryptographic requirements.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 13.1:

zypper in -t patch openSUSE-2014-181

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 13.1 (i586 x86_64):

gnutls-3.2.4-2.14.1
gnutls-debuginfo-3.2.4-2.14.1
gnutls-debugsource-3.2.4-2.14.1
libgnutls-devel-3.2.4-2.14.1
libgnutls-openssl-devel-3.2.4-2.14.1
libgnutls-openssl27-3.2.4-2.14.1
libgnutls-openssl27-debuginfo-3.2.4-2.14.1
libgnutls28-3.2.4-2.14.1
libgnutls28-debuginfo-3.2.4-2.14.1
libgnutlsxx-devel-3.2.4-2.14.1
libgnutlsxx28-3.2.4-2.14.1
libgnutlsxx28-debuginfo-3.2.4-2.14.1

– openSUSE 13.1 (x86_64):

libgnutls-devel-32bit-3.2.4-2.14.1
libgnutls28-32bit-3.2.4-2.14.1
libgnutls28-debuginfo-32bit-3.2.4-2.14.1

References:

http://support.novell.com/security/cve/CVE-2014-0092.html
https://bugzilla.novell.com/865804


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorMarko Stanec
Cert idNCERT-REF-2014-03-0006-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa gnutls26

Otkriveni su sigurnosni nedostaci u programskom paketu gnutls26 za operacijski sustav Ubuntu. Otkriveno je da postoji ranjivost prilikom provjere certifikata...

Close