Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2024-28834 CVE-2024-28835 |
CWE-ID | CWE-310 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Micro for Rancher Operating systems & Components / Operating system SUSE Linux Enterprise Micro Operating systems & Components / Operating system libgnutls30-debuginfo Operating systems & Components / Operating system package or component gnutls Operating systems & Components / Operating system package or component libgnutls30-hmac Operating systems & Components / Operating system package or component libgnutls30 Operating systems & Components / Operating system package or component gnutls-debugsource Operating systems & Components / Operating system package or component gnutls-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU87671
Risk: Medium
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-28834
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to a side-channel attack when using the gnutls_privkey_sign_data2 API function with the "GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE" flag. A remote attacker can launch Minerva attack and gain access to sensitive information.
MitigationUpdate the affected package gnutls to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.3
SUSE Linux Enterprise Micro: 5.3
libgnutls30-debuginfo: before 3.7.3-150400.8.1
gnutls: before 3.7.3-150400.8.1
libgnutls30-hmac: before 3.7.3-150400.8.1
libgnutls30: before 3.7.3-150400.8.1
gnutls-debugsource: before 3.7.3-150400.8.1
gnutls-debuginfo: before 3.7.3-150400.8.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242546-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87672
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-28835
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when parsing the cert_list_size parameter in the gnutls_x509_trust_list_verify_crt2() function in certtool. A remote attacker can pass specially crafted PEM encoded certificate chain that contains more than 16 certificates to the certtool and crash it.
Update the affected package gnutls to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.3
SUSE Linux Enterprise Micro: 5.3
libgnutls30-debuginfo: before 3.7.3-150400.8.1
gnutls: before 3.7.3-150400.8.1
libgnutls30-hmac: before 3.7.3-150400.8.1
libgnutls30: before 3.7.3-150400.8.1
gnutls-debugsource: before 3.7.3-150400.8.1
gnutls-debuginfo: before 3.7.3-150400.8.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242546-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.