Synopsis:          Important: gnutls security update
Advisory ID:       SLSA-2014:0595-1
Issue Date:        2014-06-03
CVE Numbers:       CVE-2014-3466
--

A flaw was found in the way GnuTLS parsed session IDs from ServerHello
messages of the TLS/SSL handshake. A malicious server could use this flaw
to send an excessively long session ID value, which would trigger a buffer
overflow in a connecting TLS/SSL client application using GnuTLS, causing
the client application to crash or, possibly, execute arbitrary code.
(CVE-2014-3466)

For the update to take effect, all applications linked to the GnuTLS
library must be restarted.
--

SL6
  x86_64
    gnutls-2.8.5-14.el6_5.i686.rpm
    gnutls-2.8.5-14.el6_5.x86_64.rpm
    gnutls-debuginfo-2.8.5-14.el6_5.i686.rpm
    gnutls-debuginfo-2.8.5-14.el6_5.x86_64.rpm
    gnutls-utils-2.8.5-14.el6_5.x86_64.rpm
    gnutls-devel-2.8.5-14.el6_5.i686.rpm
    gnutls-devel-2.8.5-14.el6_5.x86_64.rpm
    gnutls-guile-2.8.5-14.el6_5.i686.rpm
    gnutls-guile-2.8.5-14.el6_5.x86_64.rpm
  i386
    gnutls-2.8.5-14.el6_5.i686.rpm
    gnutls-debuginfo-2.8.5-14.el6_5.i686.rpm
    gnutls-utils-2.8.5-14.el6_5.i686.rpm
    gnutls-devel-2.8.5-14.el6_5.i686.rpm
    gnutls-guile-2.8.5-14.el6_5.i686.rpm

- Scientific Linux Development Team