From Mageia wiki
MGASA-2012-0202
Date: | August 6th, 2012 |
Affected releases: | 1 |
Description:
Updated gnutls packages fix security vulnerability:
The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain
error-handling code only if there is a specific relationship between a
padding length and the ciphertext size, which makes it easier for remote
attackers to recover partial plaintext via a timing side-channel attack
(CVE-2012-0390).
Updated Packages:
gnutls-2.10.5-2.3.mga1
lib(64)gnutls26-2.10.5-2.3.mga1
lib(64)gnutls-devel-2.10.5-2.3.mga1
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390
http://lists.opensuse.org/opensuse-updates/2012-03/msg00010.html
https://bugs.mageia.org/show_bug.cgi?id=6911