SUSE Linux Micro 6.2 gnutls Vulnerabilities Addressed in Latest Update
Severity: Medium (Score: 57.9)
Sources: Linuxsecurity
Summary
On April 8, 2026, SUSE released an update for gnutls in SUSE Linux Micro 6.2 to address two vulnerabilities: CVE-2025-14831 and CVE-2025-9820. CVE-2025-14831 involves a denial-of-service (DoS) attack that can occur due to excessive resource consumption during certificate verification. CVE-2025-9820 is a buffer overflow vulnerability in the gnutls_pkcs11_token_init function. Both vulnerabilities were reported and have been patched, with the update also adding functionality to specify the hash algorithm for the PSK. The affected systems include various architectures of SUSE Linux Micro 6.2. Users are advised to apply the update using recommended installation methods such as YaST or zypper patch. The vulnerabilities were published on January 26, 2026, and February 9, 2026, respectively. The update is crucial for maintaining system security and preventing potential exploitation. Key Points: • SUSE Linux Micro 6.2 has released a critical update addressing two vulnerabilities. • CVE-2025-14831 allows for DoS attacks through resource exhaustion during certificate verification. • Users are urged to apply the update immediately to mitigate risks associated with these vulnerabilities.
Key Entities
- Denial of Service (attack_type)
- CVE-2025-14831 (cve)
- CVE-2025-9820 (cve)
- Linux (platform)