<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">gnutls-3.4.15-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10105</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">gnutls-3.4.15-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the gnutls-3.4.15-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10105</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-4989/</URL>
      <Description>SUSE CVE CVE-2008-4989 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-4128/</URL>
      <Description>SUSE CVE CVE-2011-4128 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-0390/</URL>
      <Description>SUSE CVE CVE-2012-0390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1569/</URL>
      <Description>SUSE CVE CVE-2012-1569 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1573/</URL>
      <Description>SUSE CVE CVE-2012-1573 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0092/</URL>
      <Description>SUSE CVE CVE-2014-0092 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1959/</URL>
      <Description>SUSE CVE CVE-2014-1959 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3466/</URL>
      <Description>SUSE CVE CVE-2014-3466 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8564/</URL>
      <Description>SUSE CVE CVE-2014-8564 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6251/</URL>
      <Description>SUSE CVE CVE-2015-6251 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gnutls-3.4.15-1.1">
      <FullProductName ProductID="gnutls-3.4.15-1.1">gnutls-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gnutls-guile-3.4.15-1.1">
      <FullProductName ProductID="gnutls-guile-3.4.15-1.1">gnutls-guile-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-dane-devel-3.4.15-1.1">
      <FullProductName ProductID="libgnutls-dane-devel-3.4.15-1.1">libgnutls-dane-devel-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-dane0-3.4.15-1.1">
      <FullProductName ProductID="libgnutls-dane0-3.4.15-1.1">libgnutls-dane0-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-devel-3.4.15-1.1">
      <FullProductName ProductID="libgnutls-devel-3.4.15-1.1">libgnutls-devel-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-devel-32bit-3.4.15-1.1">
      <FullProductName ProductID="libgnutls-devel-32bit-3.4.15-1.1">libgnutls-devel-32bit-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-openssl-devel-3.4.15-1.1">
      <FullProductName ProductID="libgnutls-openssl-devel-3.4.15-1.1">libgnutls-openssl-devel-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-openssl27-3.4.15-1.1">
      <FullProductName ProductID="libgnutls-openssl27-3.4.15-1.1">libgnutls-openssl27-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls30-3.4.15-1.1">
      <FullProductName ProductID="libgnutls30-3.4.15-1.1">libgnutls30-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls30-32bit-3.4.15-1.1">
      <FullProductName ProductID="libgnutls30-32bit-3.4.15-1.1">libgnutls30-32bit-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutlsxx-devel-3.4.15-1.1">
      <FullProductName ProductID="libgnutlsxx-devel-3.4.15-1.1">libgnutlsxx-devel-3.4.15-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutlsxx28-3.4.15-1.1">
      <FullProductName ProductID="libgnutlsxx28-3.4.15-1.1">libgnutlsxx28-3.4.15-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gnutls-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gnutls-3.4.15-1.1">gnutls-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnutls-guile-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1">gnutls-guile-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-dane-devel-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1">libgnutls-dane-devel-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-dane0-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1">libgnutls-dane0-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-devel-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1">libgnutls-devel-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-devel-32bit-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1">libgnutls-devel-32bit-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-openssl-devel-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1">libgnutls-openssl-devel-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-openssl27-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1">libgnutls-openssl27-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls30-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutls30-3.4.15-1.1">libgnutls30-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls30-32bit-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1">libgnutls30-32bit-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutlsxx-devel-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1">libgnutlsxx-devel-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutlsxx28-3.4.15-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1">libgnutlsxx28-3.4.15-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).</Note>
    </Notes>
    <CVE>CVE-2008-4989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-4989.html</URL>
        <Description>CVE-2008-4989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/392947</URL>
        <Description>SUSE Bug 392947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/441856</URL>
        <Description>SUSE Bug 441856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/467911</URL>
        <Description>SUSE Bug 467911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.</Note>
    </Notes>
    <CVE>CVE-2011-4128</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-4128.html</URL>
        <Description>CVE-2011-4128</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/729486</URL>
        <Description>SUSE Bug 729486</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.</Note>
    </Notes>
    <CVE>CVE-2012-0390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-0390.html</URL>
        <Description>CVE-2012-0390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/739898</URL>
        <Description>SUSE Bug 739898</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.</Note>
    </Notes>
    <CVE>CVE-2012-1569</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1569.html</URL>
        <Description>CVE-2012-1569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/752193</URL>
        <Description>SUSE Bug 752193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/753301</URL>
        <Description>SUSE Bug 753301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924966</URL>
        <Description>SUSE Bug 924966</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.</Note>
    </Notes>
    <CVE>CVE-2012-1573</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1573.html</URL>
        <Description>CVE-2012-1573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/752193</URL>
        <Description>SUSE Bug 752193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/754223</URL>
        <Description>SUSE Bug 754223</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.</Note>
    </Notes>
    <CVE>CVE-2014-0092</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0092.html</URL>
        <Description>CVE-2014-0092</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/865804</URL>
        <Description>SUSE Bug 865804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915878</URL>
        <Description>SUSE Bug 915878</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.</Note>
    </Notes>
    <CVE>CVE-2014-1959</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1959.html</URL>
        <Description>CVE-2014-1959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/863989</URL>
        <Description>SUSE Bug 863989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/865993</URL>
        <Description>SUSE Bug 865993</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.</Note>
    </Notes>
    <CVE>CVE-2014-3466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3466.html</URL>
        <Description>CVE-2014-3466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880730</URL>
        <Description>SUSE Bug 880730</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.</Note>
    </Notes>
    <CVE>CVE-2014-8564</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8564.html</URL>
        <Description>CVE-2014-8564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/904603</URL>
        <Description>SUSE Bug 904603</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.</Note>
    </Notes>
    <CVE>CVE-2015-6251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gnutls-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6251.html</URL>
        <Description>CVE-2015-6251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941794</URL>
        <Description>SUSE Bug 941794</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
