Multiple vulnerabilities have been found in GnuTLS, the worst of which may allow execution of arbitrary code.
|Package||net-libs/gnutls on all architectures|
|Affected versions||< 3.3.26|
|Unaffected versions||>= 3.3.26|
GnuTLS is an Open Source implementation of the TLS and SSL protocols.
Multiple heap and stack overflows and double free vulnerabilities have been discovered in GnuTLS by the OSS-Fuzz project. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user or automated system to process a specially crafted certificate using an application linked against GnuTLS. This could possibly result in the execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All GnuTLS users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/gnutls-3.3.26"
February 10, 2017
February 10, 2017: 1