<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for gnutls</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1353-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-05-08T15:04:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-05-08T15:04:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-05-08T15:04:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for gnutls</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for gnutls fixes to version 3.6.7 the following issues:

Security issued fixed:

- CVE-2019-3836: Fixed an invalid pointer access via malformed TLS1.3 async messages (bsc#1130682).
- CVE-2019-3829: Fixed a double free vulnerability in the certificate verification API (bsc#1130681).
- CVE-2018-16868: Fixed Bleichenbacher-like side channel leakage in PKCS#1 v1.5 verification and padding oracle verification (bsc#1118087)

Non-security issue fixed:

- Update gnutls to support TLS 1.3 (fate#327114) 

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-1353</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U54THELOIOH5SPZKOQO47AOLQUWXG7TU/#U54THELOIOH5SPZKOQO47AOLQUWXG7TU</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1353-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118087</URL>
      <Description>SUSE Bug 1118087</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1130681</URL>
      <Description>SUSE Bug 1130681</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1130682</URL>
      <Description>SUSE Bug 1130682</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16868/</URL>
      <Description>SUSE CVE CVE-2018-16868 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3829/</URL>
      <Description>SUSE CVE CVE-2019-3829 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3836/</URL>
      <Description>SUSE CVE CVE-2019-3836 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gnutls-3.6.7-lp150.9.1">
      <FullProductName ProductID="gnutls-3.6.7-lp150.9.1">gnutls-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gnutls-guile-3.6.7-lp150.9.1">
      <FullProductName ProductID="gnutls-guile-3.6.7-lp150.9.1">gnutls-guile-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-dane-devel-3.6.7-lp150.9.1">
      <FullProductName ProductID="libgnutls-dane-devel-3.6.7-lp150.9.1">libgnutls-dane-devel-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-dane0-3.6.7-lp150.9.1">
      <FullProductName ProductID="libgnutls-dane0-3.6.7-lp150.9.1">libgnutls-dane0-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-devel-3.6.7-lp150.9.1">
      <FullProductName ProductID="libgnutls-devel-3.6.7-lp150.9.1">libgnutls-devel-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls-devel-32bit-3.6.7-lp150.9.1">
      <FullProductName ProductID="libgnutls-devel-32bit-3.6.7-lp150.9.1">libgnutls-devel-32bit-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls30-3.6.7-lp150.9.1">
      <FullProductName ProductID="libgnutls30-3.6.7-lp150.9.1">libgnutls30-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutls30-32bit-3.6.7-lp150.9.1">
      <FullProductName ProductID="libgnutls30-32bit-3.6.7-lp150.9.1">libgnutls30-32bit-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutlsxx-devel-3.6.7-lp150.9.1">
      <FullProductName ProductID="libgnutlsxx-devel-3.6.7-lp150.9.1">libgnutlsxx-devel-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgnutlsxx28-3.6.7-lp150.9.1">
      <FullProductName ProductID="libgnutlsxx28-3.6.7-lp150.9.1">libgnutlsxx28-3.6.7-lp150.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gnutls-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:gnutls-3.6.7-lp150.9.1">gnutls-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnutls-guile-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:gnutls-guile-3.6.7-lp150.9.1">gnutls-guile-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-dane-devel-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libgnutls-dane-devel-3.6.7-lp150.9.1">libgnutls-dane-devel-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-dane0-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libgnutls-dane0-3.6.7-lp150.9.1">libgnutls-dane0-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-devel-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libgnutls-devel-3.6.7-lp150.9.1">libgnutls-devel-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls-devel-32bit-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libgnutls-devel-32bit-3.6.7-lp150.9.1">libgnutls-devel-32bit-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls30-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libgnutls30-3.6.7-lp150.9.1">libgnutls30-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutls30-32bit-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libgnutls30-32bit-3.6.7-lp150.9.1">libgnutls30-32bit-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutlsxx-devel-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libgnutlsxx-devel-3.6.7-lp150.9.1">libgnutlsxx-devel-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgnutlsxx28-3.6.7-lp150.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libgnutlsxx28-3.6.7-lp150.9.1">libgnutlsxx28-3.6.7-lp150.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.</Note>
    </Notes>
    <CVE>CVE-2018-16868</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:gnutls-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:gnutls-guile-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-dane-devel-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-dane0-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-devel-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-devel-32bit-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls30-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls30-32bit-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutlsxx-devel-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutlsxx28-3.6.7-lp150.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U54THELOIOH5SPZKOQO47AOLQUWXG7TU/#U54THELOIOH5SPZKOQO47AOLQUWXG7TU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16868.html</URL>
        <Description>CVE-2018-16868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117951</URL>
        <Description>SUSE Bug 1117951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118087</URL>
        <Description>SUSE Bug 1118087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134856</URL>
        <Description>SUSE Bug 1134856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.</Note>
    </Notes>
    <CVE>CVE-2019-3829</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:gnutls-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:gnutls-guile-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-dane-devel-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-dane0-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-devel-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-devel-32bit-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls30-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls30-32bit-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutlsxx-devel-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutlsxx28-3.6.7-lp150.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U54THELOIOH5SPZKOQO47AOLQUWXG7TU/#U54THELOIOH5SPZKOQO47AOLQUWXG7TU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3829.html</URL>
        <Description>CVE-2019-3829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130681</URL>
        <Description>SUSE Bug 1130681</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.</Note>
    </Notes>
    <CVE>CVE-2019-3836</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:gnutls-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:gnutls-guile-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-dane-devel-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-dane0-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-devel-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls-devel-32bit-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls30-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutls30-32bit-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutlsxx-devel-3.6.7-lp150.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libgnutlsxx28-3.6.7-lp150.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U54THELOIOH5SPZKOQO47AOLQUWXG7TU/#U54THELOIOH5SPZKOQO47AOLQUWXG7TU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3836.html</URL>
        <Description>CVE-2019-3836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130682</URL>
        <Description>SUSE Bug 1130682</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
