-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3202-1 security@debian.org http://www.debian.org/security/ Sebastien Delafond March 22, 2015 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : mono CVE ID : CVE-2015-2318 CVE-2015-2319 CVE-2015-2320 Debian Bug : 780751 Researchers at INRIA and Xamarin discovered several vulnerabilities in mono, a platform for running and developing applications based on the ECMA/ISO Standards. Mono's TLS stack contained several problems that hampered its capabilities: those issues could lead to client impersonation (via SKIP-TLS), SSLv2 fallback, and encryption weakening (via FREAK). For the stable distribution (wheezy), these problems have been fixed in version 2.10.8.1-8+deb7u1. For the unstable distribution (sid), these problems have been fixed in version 3.2.8+dfsg-10. We recommend that you upgrade your mono packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJVDutGAAoJEBC+iYPz1Z1kr1cH/j0ZttyjgocMBOik30ZLb8gG fHctotdX+KX9nRPBg5m1i3mZ5f0NvAFeB8vTy8xnnhLkBe0hwu5iCH5jySH6rxpH XErv8934iJ++GH8FMEOOkEFK2Exs76yJQjR/eMEi9YdJlM2UZMFfHOrNEh8kdfH/ nbZ+fsKQ4VL0EcmEV31bClS0i0rlszJVExifVrWLOfm57DMqetCutNi8PKui/ZsI 7QN7fQukxUZwN0skgCOpIcZ8UYsJwcNnL0khfqwD3wX2/K/o+2QE3jK7bJ8BIrnQ gZ1gM2sHEScj+SWBIbVy6uMVYKjKOrQsCnDYLJh89ZB16o9tgEgWKUzewWDS0yU= =tb8H -----END PGP SIGNATURE-----