------------------------------------------------------------------------ Pardus Linux Security Advisory 2008-70 security@pardus.org.tr ------------------------------------------------------------------------ Date: 2008-11-14 Severity: 3 Type: Remote ------------------------------------------------------------------------ Summary ======= A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to bypass certain security restrictions. Description =========== The vulnerability is caused due to an error when validating the X.509 certificate chain and can be exploited to spoof arbitrary names e.g. during a Man-in-the-Middle (MitM) attack. Affected packages: Pardus 2008: gnutls, all before 2.2.5-13-5 Resolution ========== There are update(s) for gnutls. You can update them via Package Manager or with a single command from console: pisi up gnutls References ========== * http://bugs.pardus.org.tr/show_bug.cgi?id=8626 * http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3215 * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989 ------------------------------------------------------------------------ -- Pardus Security Team http://security.pardus.org.tr _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/