|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory for gnutls (SUSE-SU-2014:0319-1)|
|Summary:||The remote host is missing an update for the 'gnutls'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'gnutls'
package(s) announced via the referenced advisory.
The GnuTLS library received a critical security fix and
* CVE-2014-0092: The X.509 certificate verification had
incorrect error handling, which could lead to broken
certificates marked as being valid.
* CVE-2009-5138: A verification problem in handling V1
certificates could also lead to V1 certificates incorrectly
Additionally a memory leak in PSK authentication has been
Security Issue references:
gnutls on SUSE Linux Enterprise Server 11 SP3
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2009-5138|
RedHat Security Advisories: RHSA-2014:0247
SuSE Security Announcement: SUSE-SU-2014:0319 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0320 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0322 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0445 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-0092
BugTraq ID: 65919
Debian Security Information: DSA-2869 (Google Search)
RedHat Security Advisories: RHSA-2014:0246
RedHat Security Advisories: RHSA-2014:0288
RedHat Security Advisories: RHSA-2014:0339
SuSE Security Announcement: SUSE-SU-2014:0321 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0323 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0324 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0325 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0328 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0346 (Google Search)
|Copyright||Copyright (C) 2015 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.