You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa gnutls

Sigurnosni nedostatak programskog paketa gnutls

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for gnutls
______________________________________________________________________________

Announcement ID: SUSE-SU-2014:0758-1
Rating: important
References: #880730 #880910
Cross-References: CVE-2014-3466
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

GnuTLS has been patched to ensure proper parsing of session ids during the
TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have
been fixed.

Further information is available at
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
<http://www.gnutls.org/security.html#GNUTLS-SA-2014-3>

These security issues have been fixed:

* Possible memory corruption during connect (CVE-2014-3466)
* Multiple boundary check issues could allow DoS (CVE-2014-3467)
* asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
* Possible DoS by NULL pointer dereference (CVE-2014-3469)

Security Issue references:

* CVE-2014-3466
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466>

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Software Development Kit 11 SP3:

zypper in -t patch sdksp3-gnutls-9320

– SUSE Linux Enterprise Server 11 SP3 for VMware:

zypper in -t patch slessp3-gnutls-9320

– SUSE Linux Enterprise Server 11 SP3:

zypper in -t patch slessp3-gnutls-9320

– SUSE Linux Enterprise High Availability Extension 11 SP3:

zypper in -t patch slehasp3-gnutls-9320

– SUSE Linux Enterprise Desktop 11 SP3:

zypper in -t patch sledsp3-gnutls-9320

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):

libgnutls-devel-2.4.1-24.39.51.1
libgnutls-extra-devel-2.4.1-24.39.51.1
libgnutls-extra26-2.4.1-24.39.51.1

– SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

gnutls-2.4.1-24.39.51.1
libgnutls-extra26-2.4.1-24.39.51.1
libgnutls26-2.4.1-24.39.51.1

– SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):

libgnutls26-32bit-2.4.1-24.39.51.1

– SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):

gnutls-2.4.1-24.39.51.1
libgnutls-extra26-2.4.1-24.39.51.1
libgnutls26-2.4.1-24.39.51.1

– SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):

libgnutls26-32bit-2.4.1-24.39.51.1

– SUSE Linux Enterprise Server 11 SP3 (ia64):

libgnutls26-x86-2.4.1-24.39.51.1

– SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64):

libgnutls-extra26-2.4.1-24.39.51.1

– SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

gnutls-2.4.1-24.39.51.1
libgnutls26-2.4.1-24.39.51.1

– SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

libgnutls26-32bit-2.4.1-24.39.51.1

References:

http://support.novell.com/security/cve/CVE-2014-3466.html
https://bugzilla.novell.com/880730
https://bugzilla.novell.com/880910
http://download.suse.com/patch/finder/?keywords=cbb1ebdf6ecb2e49e09ac0ae8fadfbfc


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorMarijo Plepelic
Cert idNCERT-REF-2014-06-0018-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci u radu jezgre za Red Hat Enterprise Linux 6.4 Extended Update Support. Otkriveni nedostaci potencijalnim napadačima...

Close