You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa okhttp

Sigurnosni nedostaci programskog paketa okhttp

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-65b7608d8b
2016-02-29 18:03:52.031144
——————————————————————————–

Name : okhttp
Product : Fedora 23
Version : 2.7.4
Release : 1.fc23
URL : http://square.github.io/okhttp/
Summary : An HTTP+SPDY client for Java applications
Description :
An HTTP+SPDY client for Android and Java applications.

——————————————————————————–
Update Information:

This update fixes a security vulnerability which allows an attacker to bypass
certificate pinning and cause OkHttp not not to validate that the pinned
certificate was in the chain to a trusted certificate authority.
——————————————————————————–
References:

[ 1 ] Bug #1308851 – CVE-2016-2402 okhttp: certificate pining bypass
https://bugzilla.redhat.com/show_bug.cgi?id=1308851
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update okhttp’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2016-03-0002-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa okio

Otkriveni su sigurnosni nedostaci u programskom paketu okio za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju manipulaciju certifikatima zaobilaženjem...

Close