|Category:||CentOS Local Security Checks|
|Title:||CentOS Update for gnutls CESA-2013:0588 centos6|
|Summary:||The remote host is missing an update for the 'gnutls'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'gnutls'
package(s) announced via the referenced advisory.
The GnuTLS library provides support for cryptographic algorithms and for
protocols such as Transport Layer Security (TLS).
It was discovered that GnuTLS leaked timing information when decrypting
TLS/SSL protocol encrypted records when CBC-mode cipher suites were used.
A remote attacker could possibly use this flaw to retrieve plain text from
the encrypted packets by using a TLS/SSL server as a padding oracle.
Users of GnuTLS are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. For the update to take
effect, all applications linked to the GnuTLS library must be restarted,
or the system rebooted.
gnutls on CentOS 6
Please install the updated packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-1619|
RedHat Security Advisories: RHSA-2013:0588
SuSE Security Announcement: SUSE-SU-2014:0320 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0322 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:0807 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0346 (Google Search)
|Copyright||Copyright (c) 2013 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.