First published: Mon Mar 03 2014(Updated: )
The GnuTLS library provides support for cryptographic algorithms and for<br>protocols such as Transport Layer Security (TLS).<br>It was discovered that GnuTLS did not correctly handle certain errors that<br>could occur during the verification of an X.509 certificate, causing it to<br>incorrectly report a successful verification. An attacker could use this<br>flaw to create a specially crafted certificate that could be accepted by<br>GnuTLS as valid for a site chosen by the attacker. (CVE-2014-0092)<br>A flaw was found in the way GnuTLS handled version 1 X.509 certificates.<br>An attacker able to obtain a version 1 certificate from a trusted<br>certificate authority could use this flaw to issue certificates for other<br>sites that would be accepted by GnuTLS as valid. (CVE-2009-5138)<br>The CVE-2014-0092 issue was discovered by Nikos Mavrogiannopoulos of the<br>Red Hat Security Technologies Team.<br>Users of GnuTLS are advised to upgrade to these updated packages, which<br>correct these issues. For the update to take effect, all applications<br>linked to the GnuTLS library must be restarted.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <1.4.1-14.el5_10 | 1.4.1-14.el5_10 |
redhat/gnutls | <1.4.1-14.el5_10 | 1.4.1-14.el5_10 |
redhat/gnutls-debuginfo | <1.4.1-14.el5_10 | 1.4.1-14.el5_10 |
redhat/gnutls-debuginfo | <1.4.1-14.el5_10 | 1.4.1-14.el5_10 |
redhat/gnutls-devel | <1.4.1-14.el5_10 | 1.4.1-14.el5_10 |
redhat/gnutls-devel | <1.4.1-14.el5_10 | 1.4.1-14.el5_10 |
redhat/gnutls-utils | <1.4.1-14.el5_10 | 1.4.1-14.el5_10 |
redhat/gnutls-utils | <1.4.1-14.el5_10 | 1.4.1-14.el5_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.