Package: libgnutls28 Version: 3.3.2-1 Severity: critical Tags: upstream security Justification: root security hole
See the following page and please provide 3.3.4. http://www.gnutls.org/security.html -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.12.21 (SMP w/4 CPU cores; PREEMPT) Locale: LANG=en_US.UTF8, LC_CTYPE=en_US.UTF8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF8) Shell: /bin/sh linked to /bin/bash Versions of packages libgnutls28 depends on: ii libc6 2.19-0experimental0 ii libgmp10 2:6.0.0+dfsg-4 ii libhogweed2 2.7.1-2+b1 ii libnettle4 2.7.1-2+b1 ii libp11-kit0 0.20.2-5 ii libtasn1-6 3.6-1 ii multiarch-support 2.19-0experimental0 ii zlib1g 1:1.2.8.dfsg-1 libgnutls28 recommends no packages. Versions of packages libgnutls28 suggests: pn gnutls-bin <none> -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org