DSA-2944-1 gnutls26 -- security update

Related Vulnerabilities: CVE-2014-3466  

Joonas Kuorilehto discovered that GNU TLS performed insufficient validation of session IDs during TLS/SSL handshakes. A malicious server could use this to execute arbitrary code or perform denial of service. For the stable distribution (wheezy), this problem has been fixed in version 2.12.20-8+deb7u2. For the unstable distribution (sid), this problem has been fixed in version 2.12.23-16. We recommend that you upgrade your gnutls26 packages.

Debian Security Advisory

DSA-2944-1 gnutls26 -- security update

Date Reported:
01 Jun 2014
Affected Packages:
gnutls26
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2014-3466.
More information:

Joonas Kuorilehto discovered that GNU TLS performed insufficient validation of session IDs during TLS/SSL handshakes. A malicious server could use this to execute arbitrary code or perform denial of service.

For the stable distribution (wheezy), this problem has been fixed in version 2.12.20-8+deb7u2.

For the unstable distribution (sid), this problem has been fixed in version 2.12.23-16.

We recommend that you upgrade your gnutls26 packages.