Amazon Linux 1 Security Advisory: ALAS-2014-352
Advisory Release Date: 2014-06-05 15:38 Pacific
Advisory Updated Date: 2014-09-19 10:20 Pacific
A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code. (CVE-2014-3466)
Affected Packages:
gnutls
Issue Correction:
Run yum update gnutls to update your system.
i686:
gnutls-devel-2.8.5-14.13.amzn1.i686
gnutls-utils-2.8.5-14.13.amzn1.i686
gnutls-2.8.5-14.13.amzn1.i686
gnutls-debuginfo-2.8.5-14.13.amzn1.i686
gnutls-guile-2.8.5-14.13.amzn1.i686
src:
gnutls-2.8.5-14.13.amzn1.src
x86_64:
gnutls-guile-2.8.5-14.13.amzn1.x86_64
gnutls-utils-2.8.5-14.13.amzn1.x86_64
gnutls-2.8.5-14.13.amzn1.x86_64
gnutls-debuginfo-2.8.5-14.13.amzn1.x86_64
gnutls-devel-2.8.5-14.13.amzn1.x86_64