Arch Linux Security Advisory ASA-201904-2
========================================
Severity: Critical
Date    : 2019-04-05
CVE-ID  : CVE-2019-3829 CVE-2019-3836
Package : gnutls
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-945

Summary
======
The package gnutls before version 3.6.7-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.

Resolution
=========
Upgrade to 3.6.7-1.

# pacman -Syu "gnutls>=3.6.7-1"

The problems have been fixed upstream in version 3.6.7.

Workaround
=========
None.

Description
==========
- CVE-2019-3829 (arbitrary code execution)

A critical memory corruption vulnerability has been found in GnuTLS
versions prior to 3.6.7, in any API backed by verify_crt(), including
gnutls_x509_trust_list_verify_crt() and related routines. Any client or
server that verifies X.509 certificates with GnuTLS is likely affected
and can be compromised by a malicious server or active network
attacker.

- CVE-2019-3836 (denial of service)

An invalid pointer access via malformed TLS1.3 async messages has been
found in GnuTLS versions prior to 3.6.7.

Impact
=====
A remote attacker can execute arbitrary code on a client or server
validating certificates.

References
=========
https://lists.gnupg.org/pipermail/gnutls-help/2019-March/004497.html
https://gitlab.com/gnutls/gnutls/-/issues/694
https://gitlab.com/gnutls/gnutls/-/issues/704
https://security.archlinux.org/CVE-2019-3829
https://security.archlinux.org/CVE-2019-3836

ArchLinux: 201904-2: gnutls: multiple issues

April 11, 2019

Summary

- CVE-2019-3829 (arbitrary code execution) A critical memory corruption vulnerability has been found in GnuTLS versions prior to 3.6.7, in any API backed by verify_crt(), including gnutls_x509_trust_list_verify_crt() and related routines. Any client or server that verifies X.509 certificates with GnuTLS is likely affected and can be compromised by a malicious server or active network attacker.
- CVE-2019-3836 (denial of service)
An invalid pointer access via malformed TLS1.3 async messages has been found in GnuTLS versions prior to 3.6.7.

Resolution

Upgrade to 3.6.7-1. # pacman -Syu "gnutls>=3.6.7-1"
The problems have been fixed upstream in version 3.6.7.

References

https://lists.gnupg.org/pipermail/gnutls-help/2019-March/004497.html https://gitlab.com/gnutls/gnutls/-/issues/694 https://gitlab.com/gnutls/gnutls/-/issues/704 https://security.archlinux.org/CVE-2019-3829 https://security.archlinux.org/CVE-2019-3836

Severity
Package : gnutls
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-945

Workaround

None.

Related News