Summary: | <net-libs/mbedtls-2.6.0: Bypass of authentication of peer possible when the authentication mode is configured as 'optional' (CVE-2017-14032) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Aleksandr Wagner (Kivak) <alwag> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | blueness |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1487120 | ||
Whiteboard: | B4 [noglsa cve] | ||
Package list: |
=net-libs/mbedtls-2.6.0
|
Runtime testing required: | --- |
Description
Aleksandr Wagner (Kivak)
2017-08-31 13:54:33 UTC
2.6.0 is in the tree and ready for stabilization KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86" ia64 stable Stable on alpha. amd64/x86 stable arm stable sparc was dropped to exp. https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=b5901d8f716555a1479f12313a2925fcadd177a9 stanle for hppa/sparc (thanks to Rolf Eike Beer) ppc and ppc64 stable @Security please vote @Maintainer please proceed to clean the tree. Gentoo Security Padawan ChrisADR (In reply to Christopher Díaz from comment #9) > @Maintainer please proceed to clean the tree. done. GLSA Vote: No |