drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in gnutls28
Name: |
Denial of Service in gnutls28 |
|
ID: |
DSA-3884-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian jessie |
|
Datum: |
Sa, 17. Juni 2017, 00:50 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507 |
|
Applikationen: |
GNU Transport Layer Security Library |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3884-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso June 16, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : gnutls28 CVE ID : CVE-2017-7507 Debian Bug : 864560
Hubert Kario discovered that GnuTLS, a library implementing the TLS and SSL protocols, does not properly decode a status response TLS extension, allowing a remote attacker to cause an application using the GnuTLS library to crash (denial of service).
For the stable distribution (jessie), this problem has been fixed in version 3.3.8-6+deb8u6.
For the upcoming stable distribution (stretch), this problem has been fixed in version 3.5.8-5+deb9u1.
For the unstable distribution (sid), this problem has been fixed in version 3.5.8-6.
We recommend that you upgrade your gnutls28 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAllEDy1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QljQ/9ELWLrQArstlCqSkvjjfOBGtQ/Q35CsJs6x9hcKqp59EbXw136jAexdpT D15qJhsA3DnLeA4swf0hZrc3dB/BiM81y8JSROszxRpE+oujQkguNarryEGUWDFh P8sUUyM627VTsgn2rfiOIbPgK3dtnl4Nd+JH6UFHzA9dMZCszOB9Ls08A3PJxJSR QNQYwEFNMOW8URPL5ZRz+UPQnSTdJJzJ7Ybla+i28CO3KWrSNEY1UF/CaE8EP8YW OCgQblWhnNJg9xZVSPJ3BtPNqC81fohOG/eYdMp15jrXAFD19Wp17hCgck3jpwNV uZ4dOjeZ/ny6AoD3Rg+nE5bcfLD8yrCRdO3pzwp6Oz+Ue1ECzXSo4C+KWrqPbrFM +E+OyIqM9gPTDL44n1fE5prgNYzOKyFlvdLbWyiyNVJ+ETCQDW5DhP9dmA5V+fFd VVAgJbWTKlFhCY6xZULNPgfLwJDrN3UNb49UtQRKoAk51PfImMReDTaMtGsgz0hF SkQjvHRTslcSGv3+iQCDq2/FOLYB/JH+zwIdRxLA61CW7hetq3mOml7wFGGlsMzC W6RFirTOxrD/RC45oRbMFcRpgL8bxg658piO02df1zF8uCQqZCOMN1NG7bzzFs6d wTktOCUfobCH4kaVZZq92je4/wEVk1zLEDX8ATWdEFAZ1Iei2p0= =boAW -----END PGP SIGNATURE-----
|
|
|
|