Debian: DSA-3334-1: gnutls28 security update
Debian: DSA-3334-1: gnutls28 security update
Kurt Roeckx discovered that decoding a specific certificate with very long DistinguishedName (DN) entries leads to double free. A remote attacker can take advantage of this flaw by creating a specially crafted certificate that, when processed by an application compiled against
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3334-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Salvatore Bonaccorso August 12, 2015 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : gnutls28 CVE ID : not yet available Debian Bug : 795068 Kurt Roeckx discovered that decoding a specific certificate with very long DistinguishedName (DN) entries leads to double free. A remote attacker can take advantage of this flaw by creating a specially crafted certificate that, when processed by an application compiled against GnuTLS, could cause the application to crash resulting in a denial of service. For the stable distribution (jessie), this problem has been fixed in version 3.3.8-6+deb8u2. For the unstable distribution (sid), this problem has been fixed in version 3.3.17-1. We recommend that you upgrade your gnutls28 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.