Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4119 gnutls security, bug fix, and enhancement update 6 November 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gnutls Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 8 Red Hat Enterprise Linux WS/Desktop 8 Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-3836 CVE-2019-3829 Reference: ESB-2019.1945 ESB-2019.1477 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:3600 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: gnutls security, bug fix, and enhancement update Advisory ID: RHSA-2019:3600-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:3600 Issue date: 2019-11-05 CVE Names: CVE-2019-3829 CVE-2019-3836 ===================================================================== 1. Summary: An update for gnutls is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. The following packages have been upgraded to a later upstream version: gnutls (3.6.8). (BZ#1689967) Security Fix(es): * gnutls: use-after-free/double-free in certificate verification (CVE-2019-3829) * gnutls: invalid pointer access upon receiving async handshake messages (CVE-2019-3836) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1667427 - Multiple issues in implementation of record_size_limit extension (RFC 8449) 1673975 - gnutls does not support multiple KeyUpdate messages on a connection 1677048 - CVE-2019-3829 gnutls: use-after-free/double-free in certificate verification 1678411 - CVE-2019-3836 gnutls: invalid pointer access upon receiving async handshake messages 1680509 - Missing comparison with known good signature in RSA power on self test 1680510 - Missing power on self tests for SHA3 1684461 - Implement gnutls_aead_cipher_(en|de)crypt_vec() API in GnuTLS 1684534 - p11tool fails to list private keys with 'pin-value' specified in PKCS#11 URI 1686579 - GnuTLS server sends downgrade sentinel when negotiating TLS 1.3 1686582 - Incorrect handling of fragmented KeyUpdate messages 1690440 - selftest fails in FIPS mode 1691448 - TLS Keying Material Exporter is unsupported by command line tools 1705478 - gnutls fails with PKCS#11 URIs without module specification 1706921 - GnuTLS should implement continuous random test or use the kernel AF_ALG interface for random 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): aarch64: gnutls-c++-3.6.8-8.el8.aarch64.rpm gnutls-c++-debuginfo-3.6.8-8.el8.aarch64.rpm gnutls-dane-3.6.8-8.el8.aarch64.rpm gnutls-dane-debuginfo-3.6.8-8.el8.aarch64.rpm gnutls-debuginfo-3.6.8-8.el8.aarch64.rpm gnutls-debugsource-3.6.8-8.el8.aarch64.rpm gnutls-devel-3.6.8-8.el8.aarch64.rpm gnutls-utils-3.6.8-8.el8.aarch64.rpm gnutls-utils-debuginfo-3.6.8-8.el8.aarch64.rpm ppc64le: gnutls-c++-3.6.8-8.el8.ppc64le.rpm gnutls-c++-debuginfo-3.6.8-8.el8.ppc64le.rpm gnutls-dane-3.6.8-8.el8.ppc64le.rpm gnutls-dane-debuginfo-3.6.8-8.el8.ppc64le.rpm gnutls-debuginfo-3.6.8-8.el8.ppc64le.rpm gnutls-debugsource-3.6.8-8.el8.ppc64le.rpm gnutls-devel-3.6.8-8.el8.ppc64le.rpm gnutls-utils-3.6.8-8.el8.ppc64le.rpm gnutls-utils-debuginfo-3.6.8-8.el8.ppc64le.rpm s390x: gnutls-c++-3.6.8-8.el8.s390x.rpm gnutls-c++-debuginfo-3.6.8-8.el8.s390x.rpm gnutls-dane-3.6.8-8.el8.s390x.rpm gnutls-dane-debuginfo-3.6.8-8.el8.s390x.rpm gnutls-debuginfo-3.6.8-8.el8.s390x.rpm gnutls-debugsource-3.6.8-8.el8.s390x.rpm gnutls-devel-3.6.8-8.el8.s390x.rpm gnutls-utils-3.6.8-8.el8.s390x.rpm gnutls-utils-debuginfo-3.6.8-8.el8.s390x.rpm x86_64: gnutls-c++-3.6.8-8.el8.i686.rpm gnutls-c++-3.6.8-8.el8.x86_64.rpm gnutls-c++-debuginfo-3.6.8-8.el8.i686.rpm gnutls-c++-debuginfo-3.6.8-8.el8.x86_64.rpm gnutls-dane-3.6.8-8.el8.i686.rpm gnutls-dane-3.6.8-8.el8.x86_64.rpm gnutls-dane-debuginfo-3.6.8-8.el8.i686.rpm gnutls-dane-debuginfo-3.6.8-8.el8.x86_64.rpm gnutls-debuginfo-3.6.8-8.el8.i686.rpm gnutls-debuginfo-3.6.8-8.el8.x86_64.rpm gnutls-debugsource-3.6.8-8.el8.i686.rpm gnutls-debugsource-3.6.8-8.el8.x86_64.rpm gnutls-devel-3.6.8-8.el8.i686.rpm gnutls-devel-3.6.8-8.el8.x86_64.rpm gnutls-utils-3.6.8-8.el8.x86_64.rpm gnutls-utils-debuginfo-3.6.8-8.el8.i686.rpm gnutls-utils-debuginfo-3.6.8-8.el8.x86_64.rpm Red Hat Enterprise Linux BaseOS (v. 8): Source: gnutls-3.6.8-8.el8.src.rpm aarch64: gnutls-3.6.8-8.el8.aarch64.rpm gnutls-c++-debuginfo-3.6.8-8.el8.aarch64.rpm gnutls-dane-debuginfo-3.6.8-8.el8.aarch64.rpm gnutls-debuginfo-3.6.8-8.el8.aarch64.rpm gnutls-debugsource-3.6.8-8.el8.aarch64.rpm gnutls-utils-debuginfo-3.6.8-8.el8.aarch64.rpm ppc64le: gnutls-3.6.8-8.el8.ppc64le.rpm gnutls-c++-debuginfo-3.6.8-8.el8.ppc64le.rpm gnutls-dane-debuginfo-3.6.8-8.el8.ppc64le.rpm gnutls-debuginfo-3.6.8-8.el8.ppc64le.rpm gnutls-debugsource-3.6.8-8.el8.ppc64le.rpm gnutls-utils-debuginfo-3.6.8-8.el8.ppc64le.rpm s390x: gnutls-3.6.8-8.el8.s390x.rpm gnutls-c++-debuginfo-3.6.8-8.el8.s390x.rpm gnutls-dane-debuginfo-3.6.8-8.el8.s390x.rpm gnutls-debuginfo-3.6.8-8.el8.s390x.rpm gnutls-debugsource-3.6.8-8.el8.s390x.rpm gnutls-utils-debuginfo-3.6.8-8.el8.s390x.rpm x86_64: gnutls-3.6.8-8.el8.i686.rpm gnutls-3.6.8-8.el8.x86_64.rpm gnutls-c++-debuginfo-3.6.8-8.el8.i686.rpm gnutls-c++-debuginfo-3.6.8-8.el8.x86_64.rpm gnutls-dane-debuginfo-3.6.8-8.el8.i686.rpm gnutls-dane-debuginfo-3.6.8-8.el8.x86_64.rpm gnutls-debuginfo-3.6.8-8.el8.i686.rpm gnutls-debuginfo-3.6.8-8.el8.x86_64.rpm gnutls-debugsource-3.6.8-8.el8.i686.rpm gnutls-debugsource-3.6.8-8.el8.x86_64.rpm gnutls-utils-debuginfo-3.6.8-8.el8.i686.rpm gnutls-utils-debuginfo-3.6.8-8.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-3829 https://access.redhat.com/security/cve/CVE-2019-3836 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXcHqVdzjgjWX9erEAQivkg//T1uT+4YnLfKeaK7faseEHaqGlgkUR5ac mBrFTuSw5amGRgDJmnf0yEq1sA8C413zrfpl2CXyThIidShOL5iR7ubODQ79w7kC sUKcD2wP8AzDXul9ip/fGO+0mOUr1Fz48urD0p2dXYKIa0OIPrz3ID20IH0zUsuI ED/7hbUkw49T150O2TjPyB5RkR0IdyDYXy3lZ/VJi1797rbFRPJKFxh7EMkr+KVQ 5rgZu0sa/MECVxCSNqQlTzwKwopn2t+dWI76ntiJwVQu9A00vBParIUJN3UAdBKD E+2k1MNMqv2fpxkPawXMCxwnqhOk50QjYw95kj8X21PDRSh8/FZZ14XHPk5bnf3t VirzV3JAAcxtI+yYdRfdW1K7fupVcmWKll9RzQTL3PzZ53FNRNu7Ww1Rd+s2c6p9 IuuWNDqyWeQavfIe8LZ0isETKeXuK40og1GSNTAUYjCXsH1aO7kB6rq0ewMAOXNg mfmwUthLyprL8xyPTrA9RvO3xtY3PbBkaTxTbJgkYWv4RqMO2XFQtWu8+LaB0IM4 Hsp+bl+cd7nZJVUfboMyHL+gU6JHgrek3+qd3B9ogHPDE0n7T+NdJb4QyVrYo5RO SQ0nqyr0Lg2sKtxGqPMulYaY4cE9EmVgUjKBPy+SOBUGucoDMSY0V3mhtVfOaMOe Lb00IwJNVnk= =XBVn - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXcI5JWaOgq3Tt24GAQgBhRAAjPV1Q9QV8119Bdp6aT3yradjm3m9fYY7 oEY7RcoYn0IgN7fxr02Smi3eweowba6Myne4ikFgoxIhx6I+Gtp2IihkRfKH+/kh Ti2p8esvqCpa6RxcbJ9nfgwWgko8KJs+8dWh8lAsBnPJxgLLGZoQfig6Mj15bWbU 3TF6EYgq2cmZ2FKUjJHbMcDOeJ/EUpQV5thwqlNX1Ab8oK5gByCDPQCYxY8xdc9E YFpTfN/LzIwSKjp5Kj10wef8FtOCUGNGZWaTCfTgv0Qw3a1jH5esksep7XYhZSt/ aAv/6D+5u4kubzCL2DFaGlSks3EXrQTyI6I9ZIjmMPhYgSg5sw5pWz3bfeTQmtJw 2Y5vdmk4XVEeGA6IpSO1alndDs3Zc/2rSIvsWM49JRWGzIPaMDjPvpp5Z/b4MGyG 8wvOwLwrI9fLn1bK+CI9+m3BtaavZJB2eoC20zaA0or05hPMjzXF4ihwtieouAaY TzLJ0TfSZchqFDv60CXiNidr0hGd00nj4wcrBiyE8ONLPc4MvonoLXaE1dD2IGy9 crXECRQAg8wE4JWZqGWsGNUT1iWFrzsSqFcWwsmH54R77pBc698VIT+K2v/goObg 6BLQxYsQE0f8Q35iHQOgSPoxxW6T/CyLmRo7H6+5mbdtqeesyyyWNr9MnH0EHRKh +Wdu7VQiH5w= =w/6M -----END PGP SIGNATURE-----