GnuTLS Security update for Novell Open Enterprise Server 11 SP1.
This document (7015303) is provided subject to the disclaimer at the end of this document.
Novell Open Enterprise Server 11 (OES 11) Linux Support Pack 1
Novell Open Enterprise Server 11 SP1 General support ends on 29 Jan 2015.
A number of GnuTLS related Security Vulnerabilities were reported.
Due to the current support status for Novell Open Enterprise Server 11 SP1, the Novell and SUSE teams have closely collaborated to make these fix available for Novell OES11 SP1 customers.
The oes11sp1-gnutls-9429 patch containing the
mentioned fixes for SLES 11 SP2 is released through the public OES11 SP1
patch repositories on 30 June 2014.
GnuTLS has been patched to ensure proper parsing of session ids during the TLS/SSL handshake. Additionally three issues inherited from libtasn1 have been fixed.
Further information is available at http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
These security issues have been fixed:
- Possible memory corruption during connect (CVE-2014-3466)
- Multiple boundary check issues could allow DoS (CVE-2014-3467)
- asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
- Possible DoS by NULL pointer dereference (CVE-2014-3469)
This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:7015303
- Creation Date:01-JUL-14
- Modified Date:01-JUL-14
- NovellOpen Enterprise Server
- SUSESUSE Linux Enterprise Server
Did this document solve your problem? Provide Feedback