Le 02/06/2012 14:52, Yves-Alexis Perez a écrit :
> -------------------------------------------------------------------------
> Debian Security Advisory DSA-2482-1                   secur...@debian.org
> http://www.debian.org/security/                         Yves-Alexis Perez
> June 2, 2012                           http://www.debian.org/security/faq
> -------------------------------------------------------------------------
>
> Package        : libgdata
> Vulnerability  : insufficient certificate validation
> Problem type   : remote
> Debian-specific: no
> CVE ID         : CVE-2012-2653
> Debian Bug     : 664032
>
> Vreixo Formoso discovered that libgdata, a library used to access various
> Google services, wasn't validating certificates against trusted system
> root CAs when using an https connection.
>
> For the stable distribution (squeeze), this problem has been fixed in
> version 0.6.4-2+squeeze1.
>
> For the testing distribution (wheezy), this problem has been fixed in
> version 0.10.2-1.
>
> For the unstable distribution (sid), this problem has been fixed in
> version 0.10.2-1.
>
> We recommend that you upgrade your libgdata packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: http://www.debian.org/security/
>
> Mailing list: debian-security-annou...@lists.debian.org

Hi,

Wrong subject: s/arpwatch/libgdata/

Cheers,
Vincent


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fca0f2e.8040...@free.fr

Reply via email to