First published: Tue May 27 2014(Updated: )
A NULL pointer dereference flaw was discovered in GnuTLS's gnutls_x509_dn_oid_name(). The function, when called with the GNUTLS_X509_DN_OID_RETURN_OID flag, should not return NULL to its caller. However, it could previously return NULL when parsed X.509 certificates included specific OIDs. The issue was corrected upstream using the following commit: <a href="https://www.gitorious.org/gnutls/gnutls/commit/d3648ebb04b650e6d20a2ec1fb839256b30b9fc6">https://www.gitorious.org/gnutls/gnutls/commit/d3648ebb04b650e6d20a2ec1fb839256b30b9fc6</a> The fix was first included in upstream versions 3.1.20 and 3.2.10: <a href="http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/7251">http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/7251</a> <a href="http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/7250">http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/7250</a> Affected function was introduced in GnuTLS version 3.0: <a href="http://gnutls.org/manual/html_node/X509-certificate-API.html#gnutls_005fx509_005fdn_005foid_005fname-1">http://gnutls.org/manual/html_node/X509-certificate-API.html#gnutls_005fx509_005fdn_005foid_005fname-1</a> The gnutls packages in Red Hat Enterprise Linux 6 and earlier include GnuTLS versions 2.x or 1.x and were therefore not affected by this issue. The gnutls and mingw-gnutls packages in Fedora are already updated to the fixed upstream version.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <3.1.20 | 3.1.20 |
redhat/gnutls | <3.2.10 | 3.2.10 |
GNU GnuTLS | =3.0.0 | |
GNU GnuTLS | =3.0.1 | |
GNU GnuTLS | =3.0.2 | |
GNU GnuTLS | =3.0.3 | |
GNU GnuTLS | =3.0.4 | |
GNU GnuTLS | =3.0.5 | |
GNU GnuTLS | =3.0.6 | |
GNU GnuTLS | =3.0.7 | |
GNU GnuTLS | =3.0.8 | |
GNU GnuTLS | =3.0.9 | |
GNU GnuTLS | =3.0.10 | |
GNU GnuTLS | =3.0.11 | |
GNU GnuTLS | =3.0.12 | |
GNU GnuTLS | =3.0.13 | |
GNU GnuTLS | =3.0.14 | |
GNU GnuTLS | =3.0.15 | |
GNU GnuTLS | =3.0.16 | |
GNU GnuTLS | =3.0.17 | |
GNU GnuTLS | =3.0.18 | |
GNU GnuTLS | =3.0.19 | |
GNU GnuTLS | =3.0.20 | |
GNU GnuTLS | =3.0.21 | |
GNU GnuTLS | =3.0.22 | |
GNU GnuTLS | =3.0.23 | |
GNU GnuTLS | =3.0.24 | |
GNU GnuTLS | =3.0.25 | |
GNU GnuTLS | =3.0.26 | |
GNU GnuTLS | =3.0.27 | |
GNU GnuTLS | =3.0.28 | |
GNU GnuTLS | =3.1.0 | |
GNU GnuTLS | =3.1.1 | |
GNU GnuTLS | =3.1.2 | |
GNU GnuTLS | =3.1.3 | |
GNU GnuTLS | =3.1.4 | |
GNU GnuTLS | =3.1.5 | |
GNU GnuTLS | =3.1.6 | |
GNU GnuTLS | =3.1.7 | |
GNU GnuTLS | =3.1.8 | |
GNU GnuTLS | =3.1.9 | |
GNU GnuTLS | =3.1.10 | |
GNU GnuTLS | =3.1.11 | |
GNU GnuTLS | =3.1.12 | |
GNU GnuTLS | =3.1.13 | |
GNU GnuTLS | =3.1.14 | |
GNU GnuTLS | =3.1.15 | |
GNU GnuTLS | =3.1.16 | |
GNU GnuTLS | =3.1.17 | |
GNU GnuTLS | =3.1.18 | |
GNU GnuTLS | =3.1.19 | |
GNU GnuTLS | =3.2.0 | |
GNU GnuTLS | =3.2.1 | |
GNU GnuTLS | =3.2.2 | |
GNU GnuTLS | =3.2.3 | |
GNU GnuTLS | =3.2.4 | |
GNU GnuTLS | =3.2.5 | |
GNU GnuTLS | =3.2.6 | |
GNU GnuTLS | =3.2.7 | |
GNU GnuTLS | =3.2.8 | |
GNU GnuTLS | =3.2.8.1 | |
GNU GnuTLS | =3.2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.