drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Prüfung von Zertifikaten in okhttp
Name: |
Mangelnde Prüfung von Zertifikaten in okhttp |
|
ID: |
FEDORA-2016-65b7608d8b |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 23 |
|
Datum: |
Di, 1. März 2016, 08:26 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2402 |
|
Applikationen: |
okhttp |
|
Originalnachricht |
Name : okhttp Product : Fedora 23 Version : 2.7.4 Release : 1.fc23 URL : http://square.github.io/okhttp/ Summary : An HTTP+SPDY client for Java applications Description : An HTTP+SPDY client for Android and Java applications.
------------------------------------------------------------------------------- - Update Information:
This update fixes a security vulnerability which allows an attacker to bypass certificate pinning and cause OkHttp not not to validate that the pinned certificate was in the chain to a trusted certificate authority. ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1308851 - CVE-2016-2402 okhttp: certificate pining bypass https://bugzilla.redhat.com/show_bug.cgi?id=1308851 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update okhttp' at the command line. For more information, refer to "Managing Software with yum", available at https://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|