[ASA-201904-2] gnutls: multiple issues
Remi Gacogne
rgacogne at archlinux.org
Thu Apr 11 06:04:28 UTC 2019
Arch Linux Security Advisory ASA-201904-2
=========================================
Severity: Critical
Date : 2019-04-05
CVE-ID : CVE-2019-3829 CVE-2019-3836
Package : gnutls
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-945
Summary
=======
The package gnutls before version 3.6.7-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Resolution
==========
Upgrade to 3.6.7-1.
# pacman -Syu "gnutls>=3.6.7-1"
The problems have been fixed upstream in version 3.6.7.
Workaround
==========
None.
Description
===========
- CVE-2019-3829 (arbitrary code execution)
A critical memory corruption vulnerability has been found in GnuTLS
versions prior to 3.6.7, in any API backed by verify_crt(), including
gnutls_x509_trust_list_verify_crt() and related routines. Any client or
server that verifies X.509 certificates with GnuTLS is likely affected
and can be compromised by a malicious server or active network
attacker.
- CVE-2019-3836 (denial of service)
An invalid pointer access via malformed TLS1.3 async messages has been
found in GnuTLS versions prior to 3.6.7.
Impact
======
A remote attacker can execute arbitrary code on a client or server
validating certificates.
References
==========
https://lists.gnupg.org/pipermail/gnutls-help/2019-March/004497.html
https://gitlab.com/gnutls/gnutls/issues/694
https://gitlab.com/gnutls/gnutls/issues/704
https://security.archlinux.org/CVE-2019-3829
https://security.archlinux.org/CVE-2019-3836
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190411/5f14b239/attachment.sig>
More information about the arch-security
mailing list