Package : gnutls26 Version : 2.8.6-1+squeeze6 CVE ID : CVE-2015-8313 Hanno Böck discovered that GnuTLS, a library implementing the TLS and SSL protocols, incorrectly validated the first padding byte in CBC modes. A remote attacker can possibly take advantage of this flaw to perform a padding oracle attack. For Debian 6 "Squeeze", this issue has been fixed in gnutls26 version 2.8.6-1+squeeze6. We recommend you to upgrade your gnutls26 packages. Learn more about the Debian Long Term Support (LTS) Project and how to apply these updates at: https://wiki.debian.org/LTS/
Attachment:
signature.asc
Description: Digital signature