Mehrere Probleme in GNU Transport Layer Security Library
ID: | 201506-03 |
Distribution: | Gentoo |
Plattformen: | Keine Angabe |
Datum: | Di, 23. Juni 2015, 08:31 |
Referenzen: | http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3308
http://www.gnutls.org/security.html#GNUTLS-SA-2015-2 |
Applikationen: | GNU Transport Layer Security Library |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --APiKeXeaotfasswE4NJX9auuq6AGJgapA Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201506-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: GnuTLS: Multiple vulnerabilities Date: June 22, 2015 Bugs: #546760, #548636 ID: 201506-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been fixed in GnuTLS, the worst of which can cause Denial of Service Background ========== GnuTLS is an Open Source implementation of the TLS and SSL protocols. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-libs/gnutls < 3.3.15 >= 3.3.15 Description =========== Multiple vulnerabilities have been discovered in GnuTLS. Please review the CVE identifiers and external references below for details. Impact ====== A context-dependent attacker can cause a denial of service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All GnuTLS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/gnutls-3.3.15" References ========== [ 1 ] CVE-2015-3308 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3308 [ 2 ] GNUTLS-SA-2015-2 http://www.gnutls.org/security.html#GNUTLS-SA-2015-2 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201506-03 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --APiKeXeaotfasswE4NJX9auuq6AGJgapA Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJViIBxAAoJECULev7WN52FMKEH/0teVt570SSUBJJPWb6WpUEw QJ7teOqM8DPZDxGHbvObPVC6ab7CGAiVoSVSNTL66eAHfLkB20gp1weDrP1EVWwB ldFaRQCVvQlHUXP++Px2Lg6d0rl1isKEnn/RqxYLC0pERzNomQsVvUBU9d6FOPZt VBYh6QIMwKMNyfvJHX5AwkwvO383Vvvp5hvKp4guDhNGjegzZ9SD4Z0TvNxV7Ghs UBTkKGzqmF5qDf3l4gXBZiMsmNn3f1p0beua09rPSMVX1JiJT58fxGDWvdqFEGFi ucRSIiEpxnSocWE1/NF4oMk9j8p9db7N0kH5TY/TJOpFy+kmIGBO4vjz76XBT2M= =JYKm -----END PGP SIGNATURE----- --APiKeXeaotfasswE4NJX9auuq6AGJgapA-- |