Package : gnutls26 Version : 2.8.6-1+squeeze6 CVE ID : CVE-2015-8313
Hanno Böck discovered that GnuTLS, a library implementing the TLS and SSL protocols, incorrectly validated the first padding byte in CBC modes. A remote attacker can possibly take advantage of this flaw to perform a padding oracle attack.
For Debian 6 "Squeeze", this issue has been fixed in gnutls26 version 2.8.6-1+squeeze6. We recommend you to upgrade your gnutls26 packages.
Learn more about the Debian Long Term Support (LTS) Project and how to apply these updates at: https://wiki.debian.org/LTS/