Bugzilla – Bug 904603
VUL-0: CVE-2014-8564: gnutls: heap corruption in encoding elliptic curve parameters
Last modified: 2016-04-27 19:31:48 UTC
via gnutls twitter http://www.gnutls.org/security.html#GNUTLS-SA-2014-5 GNUTLS-SA-2014-5 CVE-2014-8564 Denial of service Sean Burford reported that the encoding of elliptic curves parameters GnuTLS 3 is vulnerable to a denial of service (heap corruption). It affects clients and servers which print information about the peer's certificate, e.g., the key ID, and can be exploited via a specially crafted X.509 certificate. Recommendation: Upgrade to GnuTLS 3.3.10, 3.2.20 or 3.1.28.
bugowner is meissner ... doll
bugbot adjusting priority
Created attachment 613304 [details] gnutls-CVE-2014-8564.patch commit 7429872b74c8216bbf15e241e47aba94369ef083 Author: Nikos Mavrogiannopoulos <nmav@gnutls.org> Date: Mon Nov 10 07:50:18 2014 +0100 when exporting curve coordinates to X9.63 format, perform additional sanity checks on input Reported by Sean Burford.
sles11 gnutls 2.4.1 had no ECC support at all, so its not affected.
submitted
openSUSE-SU-2014:1472-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 904603 CVE References: CVE-2014-8564 Sources used: openSUSE 13.2 (src): gnutls-3.2.18-4.1 openSUSE 13.1 (src): gnutls-3.2.4-2.28.1 openSUSE 12.3 (src): gnutls-3.0.28-1.18.1
This is an autogenerated message for OBS integration: This bug (904603) was mentioned in https://build.opensuse.org/request/show/262808 Factory / gnutls
SUSE-SU-2014:1628-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 904603 CVE References: CVE-2014-8564 Sources used: SUSE Linux Enterprise Software Development Kit 12 (src): gnutls-3.2.15-4.1 SUSE Linux Enterprise Server 12 (src): gnutls-3.2.15-4.1 SUSE Linux Enterprise Desktop 12 (src): gnutls-3.2.15-4.1
reelased