Bugzilla – Bug 941794
VUL-0: CVE-2015-6251: gnutls: double free in certificate DN decoding (GNUTLS-SA-2015-3)
Last modified: 2016-02-10 07:31:04 UTC
From http://www.gnutls.org/security.html#GNUTLS-SA-2015-3 Kurt Roeckx reported that decoding a specific certificate with very long DistinguishedName (DN) entries leads to double free, which may result to a denial of service. Since the DN decoding occurs in almost all applications using certificates it is recommended to upgrade the latest GnuTLS version fixing the issue. https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12 http://seclists.org/oss-sec/2015/q3/308
https://bugzilla.redhat.com/show_bug.cgi?id=1251902
https://www.debian.org/security/2015/dsa-3334 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795068
bugbot adjusting priority
CVE-2015-6251 was assigned to this issue.
The linked commit is for the 3.3, 3.4 branch fixed the bug differently, by rewriting the DN parsing code to allow very long DNs. The security fix patches _gnutls_x509_dn_to_string() function which was introduced in gnutls 3.1.5, thus only SLE-12 and openSUSE are affected. Packages are submitted. Reassigning to security team.
This is an autogenerated message for OBS integration: This bug (941794) was mentioned in https://build.opensuse.org/request/show/324906 13.2+13.1 / gnutls
openSUSE-SU-2015:1499-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 941794 CVE References: CVE-2015-6251 Sources used: openSUSE 13.2 (src): gnutls-3.2.18-14.1 openSUSE 13.1 (src): gnutls-3.2.4-2.38.1
SUSE-SU-2015:1518-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 929414,929690,941794 CVE References: CVE-2015-3622,CVE-2015-6251 Sources used: SUSE Linux Enterprise Software Development Kit 12 (src): gnutls-3.2.15-11.1 SUSE Linux Enterprise Server 12 (src): gnutls-3.2.15-11.1 SUSE Linux Enterprise Desktop 12 (src): gnutls-3.2.15-11.1
released