ALAS-2014-397


Amazon Linux 1 Security Advisory: ALAS-2014-397
Advisory Release Date: 2014-09-03 14:37 Pacific
Advisory Updated Date: 2014-09-19 11:49 Pacific
Severity: Medium

Issue Overview:

The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.


Affected Packages:

libserf


Issue Correction:
Run yum update libserf to update your system.

New Packages:
i686:
    libserf-debuginfo-1.3.7-1.6.amzn1.i686
    libserf-devel-1.3.7-1.6.amzn1.i686
    libserf-1.3.7-1.6.amzn1.i686

src:
    libserf-1.3.7-1.6.amzn1.src

x86_64:
    libserf-1.3.7-1.6.amzn1.x86_64
    libserf-devel-1.3.7-1.6.amzn1.x86_64
    libserf-debuginfo-1.3.7-1.6.amzn1.x86_64