You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa gnutls28

Sigurnosni nedostatak programskog paketa gnutls28

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3884-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 16, 2017 https://www.debian.org/security/faq
– ————————————————————————-

Package : gnutls28
CVE ID : CVE-2017-7507
Debian Bug : 864560

Hubert Kario discovered that GnuTLS, a library implementing the TLS and
SSL protocols, does not properly decode a status response TLS extension,
allowing a remote attacker to cause an application using the GnuTLS
library to crash (denial of service).

For the stable distribution (jessie), this problem has been fixed in
version 3.3.8-6+deb8u6.

For the upcoming stable distribution (stretch), this problem has been
fixed in version 3.5.8-5+deb9u1.

For the unstable distribution (sid), this problem has been fixed in
version 3.5.8-6.

We recommend that you upgrade your gnutls28 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
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=boAW
—–END PGP SIGNATURE—–

AutorVlatka Misic
Cert idNCERT-REF-2017-06-0100-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa request-tracker4

Otkriveni su sigurnosni nedostaci u programskom paketu request-tracker4 za operacijski sustav Debian. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje XSS napada,...

Close