ALAS-2014-352


Amazon Linux AMI Security Advisory: ALAS-2014-352
Advisory Release Date: 2014-09-19 10:20 Pacific
Severity: Important

Issue Overview:

A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code. (CVE-2014-3466 )


Affected Packages:

gnutls


Issue Correction:
Run yum update gnutls to update your system.

New Packages:
i686:
    gnutls-devel-2.8.5-14.13.amzn1.i686
    gnutls-utils-2.8.5-14.13.amzn1.i686
    gnutls-2.8.5-14.13.amzn1.i686
    gnutls-debuginfo-2.8.5-14.13.amzn1.i686
    gnutls-guile-2.8.5-14.13.amzn1.i686

src:
    gnutls-2.8.5-14.13.amzn1.src

x86_64:
    gnutls-guile-2.8.5-14.13.amzn1.x86_64
    gnutls-utils-2.8.5-14.13.amzn1.x86_64
    gnutls-2.8.5-14.13.amzn1.x86_64
    gnutls-debuginfo-2.8.5-14.13.amzn1.x86_64
    gnutls-devel-2.8.5-14.13.amzn1.x86_64