[ASA-201904-2] gnutls: multiple issues

Remi Gacogne rgacogne at archlinux.org
Thu Apr 11 06:04:28 UTC 2019


Arch Linux Security Advisory ASA-201904-2
=========================================

Severity: Critical
Date    : 2019-04-05
CVE-ID  : CVE-2019-3829 CVE-2019-3836
Package : gnutls
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-945

Summary
=======

The package gnutls before version 3.6.7-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.

Resolution
==========

Upgrade to 3.6.7-1.

# pacman -Syu "gnutls>=3.6.7-1"

The problems have been fixed upstream in version 3.6.7.

Workaround
==========

None.

Description
===========

- CVE-2019-3829 (arbitrary code execution)

A critical memory corruption vulnerability has been found in GnuTLS
versions prior to 3.6.7, in any API backed by verify_crt(), including
gnutls_x509_trust_list_verify_crt() and related routines. Any client or
server that verifies X.509 certificates with GnuTLS is likely affected
and can be compromised by a malicious server or active network
attacker.

- CVE-2019-3836 (denial of service)

An invalid pointer access via malformed TLS1.3 async messages has been
found in GnuTLS versions prior to 3.6.7.

Impact
======

A remote attacker can execute arbitrary code on a client or server
validating certificates.

References
==========

https://lists.gnupg.org/pipermail/gnutls-help/2019-March/004497.html
https://gitlab.com/gnutls/gnutls/issues/694
https://gitlab.com/gnutls/gnutls/issues/704
https://security.archlinux.org/CVE-2019-3829
https://security.archlinux.org/CVE-2019-3836

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190411/5f14b239/attachment.sig>


More information about the arch-security mailing list