openSUSE Security Update: gnutls: fixed SSL certificate validation problems
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2014:0325-1
Rating:             critical
References:         #865804 
Cross-References:   CVE-2014-0092
Affected Products:
                    openSUSE 13.1
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:


   The gnutls library was updated to fixed x509 certificate
   validation problems, where man-in-the-middle attackers   could hijack SSL connections.

   This update also reenables Elliptic Curve support to meet
   current day cryptographic requirements.


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.1:

      zypper in -t patch openSUSE-2014-181

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.1 (i586 x86_64):

      gnutls-3.2.4-2.14.1
      gnutls-debuginfo-3.2.4-2.14.1
      gnutls-debugsource-3.2.4-2.14.1
      libgnutls-devel-3.2.4-2.14.1
      libgnutls-openssl-devel-3.2.4-2.14.1
      libgnutls-openssl27-3.2.4-2.14.1
      libgnutls-openssl27-debuginfo-3.2.4-2.14.1
      libgnutls28-3.2.4-2.14.1
      libgnutls28-debuginfo-3.2.4-2.14.1
      libgnutlsxx-devel-3.2.4-2.14.1
      libgnutlsxx28-3.2.4-2.14.1
      libgnutlsxx28-debuginfo-3.2.4-2.14.1

   - openSUSE 13.1 (x86_64):

      libgnutls-devel-32bit-3.2.4-2.14.1
      libgnutls28-32bit-3.2.4-2.14.1
      libgnutls28-debuginfo-32bit-3.2.4-2.14.1


References:

   https://www.suse.com/security/cve/CVE-2014-0092.html
   https://bugzilla.novell.com/865804

openSUSE: 2014:0325-1: critical: gnutls

March 5, 2014
An update that fixes one vulnerability is now available

Description

The gnutls library was updated to fixed x509 certificate validation problems, where man-in-the-middle attackers could hijack SSL connections. This update also reenables Elliptic Curve support to meet current day cryptographic requirements.

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2014-181 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 13.1 (i586 x86_64): gnutls-3.2.4-2.14.1 gnutls-debuginfo-3.2.4-2.14.1 gnutls-debugsource-3.2.4-2.14.1 libgnutls-devel-3.2.4-2.14.1 libgnutls-openssl-devel-3.2.4-2.14.1 libgnutls-openssl27-3.2.4-2.14.1 libgnutls-openssl27-debuginfo-3.2.4-2.14.1 libgnutls28-3.2.4-2.14.1 libgnutls28-debuginfo-3.2.4-2.14.1 libgnutlsxx-devel-3.2.4-2.14.1 libgnutlsxx28-3.2.4-2.14.1 libgnutlsxx28-debuginfo-3.2.4-2.14.1 - openSUSE 13.1 (x86_64): libgnutls-devel-32bit-3.2.4-2.14.1 libgnutls28-32bit-3.2.4-2.14.1 libgnutls28-debuginfo-32bit-3.2.4-2.14.1


References

https://www.suse.com/security/cve/CVE-2014-0092.html https://bugzilla.novell.com/865804


Severity
Announcement ID: openSUSE-SU-2014:0325-1
Rating: critical
Affected Products: openSUSE 13.1 .

Related News