Bug#864560: gnutls28: CVE-2017-7507

Salvatore Bonaccorso carnil at debian.org
Sat Jun 10 17:20:06 UTC 2017

Source: gnutls28
Version: 3.5.8-1
Severity: important
Tags: patch security upstream fixed-upstream
Control: fixed -1 3.5.13-1


the following vulnerability was published for gnutls28.

Crash upon receiving well-formed status_request extension

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-7507
[1] https://gnutls.org/security.html#GNUTLS-SA-2017-4

Please adjust the affected versions in the BTS as needed, just checked
3.5.8 in unstable sourcewise. Not sure as well if it would need a DSA
if older versions are affected as well.


More information about the Pkg-gnutls-maint mailing list