Login


 
Newsletter
Werbung

Sicherheit: Mangelnde Prüfung von Zertifikaten in okio
Aktuelle Meldungen Distributionen
Name: Mangelnde Prüfung von Zertifikaten in okio
ID: FEDORA-2016-65b7608d8b
Distribution: Fedora
Plattformen: Fedora 23
Datum: Di, 1. März 2016, 08:27
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2402

Originalnachricht

Name        : okio
Product : Fedora 23
Version : 1.6.0
Release : 1.fc23
URL : http://square.github.io/okio/
Summary : Java I/O library
Description :
Okio is a new library that complements java.io and java.nio to make it
much easier to access, store, and process data.

-------------------------------------------------------------------------------
-
Update Information:

This update fixes a security vulnerability which allows an attacker to bypass
certificate pinning and cause OkHttp not not to validate that the pinned
certificate was in the chain to a trusted certificate authority.
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1308851 - CVE-2016-2402 okhttp: certificate pining bypass
https://bugzilla.redhat.com/show_bug.cgi?id=1308851
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update okio' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung