Multiple vulnerabilities have been found in GnuTLS, the worst of which may allow execution of arbitrary code.
Package | net-libs/gnutls on all architectures |
---|---|
Affected versions | < 3.3.26 |
Unaffected versions | >= 3.3.26 |
GnuTLS is an Open Source implementation of the TLS and SSL protocols.
Multiple heap and stack overflows and double free vulnerabilities have been discovered in GnuTLS by the OSS-Fuzz project. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user or automated system to process a specially crafted certificate using an application linked against GnuTLS. This could possibly result in the execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All GnuTLS users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/gnutls-3.3.26"
Release date
February 10, 2017
Latest revision
February 10, 2017: 1
Severity
normal
Exploitable
remote
Bugzilla entries