Bug 941794 (CVE-2015-6251) - VUL-0: CVE-2015-6251: gnutls: double free in certificate DN decoding (GNUTLS-SA-2015-3)
Summary: VUL-0: CVE-2015-6251: gnutls: double free in certificate DN decoding (GNUTLS-...
Status: RESOLVED FIXED
Alias: CVE-2015-6251
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-08-14 14:42 UTC by Andreas Stieger
Modified: 2016-02-10 07:31 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-08-14 14:42:10 UTC
From http://www.gnutls.org/security.html#GNUTLS-SA-2015-3

Kurt Roeckx reported that decoding a specific certificate with very long DistinguishedName (DN) entries leads to double free, which may result to a denial of service. Since the DN decoding occurs in almost all applications using certificates it is recommended to upgrade the latest GnuTLS version fixing the issue.

https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12
http://seclists.org/oss-sec/2015/q3/308
Comment 1 Andreas Stieger 2015-08-14 14:43:24 UTC
https://bugzilla.redhat.com/show_bug.cgi?id=1251902
Comment 3 Swamp Workflow Management 2015-08-14 22:00:37 UTC
bugbot adjusting priority
Comment 4 Alexander Bergmann 2015-08-18 15:20:27 UTC
CVE-2015-6251 was assigned to this issue.
Comment 5 Vítězslav Čížek 2015-08-21 12:12:27 UTC
The linked commit is for the 3.3, 3.4 branch fixed the bug differently, by rewriting the DN parsing code to allow very long DNs.

The security fix patches _gnutls_x509_dn_to_string() function which was introduced in gnutls 3.1.5, thus only SLE-12 and openSUSE are affected.

Packages are submitted.
Reassigning to security team.
Comment 7 Bernhard Wiedemann 2015-08-21 13:00:36 UTC
This is an autogenerated message for OBS integration:
This bug (941794) was mentioned in
https://build.opensuse.org/request/show/324906 13.2+13.1 / gnutls
Comment 8 Swamp Workflow Management 2015-09-07 06:09:37 UTC
openSUSE-SU-2015:1499-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 941794
CVE References: CVE-2015-6251
Sources used:
openSUSE 13.2 (src):    gnutls-3.2.18-14.1
openSUSE 13.1 (src):    gnutls-3.2.4-2.38.1
Comment 9 Swamp Workflow Management 2015-09-09 16:13:10 UTC
SUSE-SU-2015:1518-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 929414,929690,941794
CVE References: CVE-2015-3622,CVE-2015-6251
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    gnutls-3.2.15-11.1
SUSE Linux Enterprise Server 12 (src):    gnutls-3.2.15-11.1
SUSE Linux Enterprise Desktop 12 (src):    gnutls-3.2.15-11.1
Comment 10 Marcus Meissner 2016-02-10 07:31:04 UTC
released