This update fixes a security vulnerability which allows an attacker to bypass certificate pinning and cause OkHttp not not to validate that the pinned certificate was in the chain to a trusted certificate authority.

How to install

sudo dnf upgrade --advisory=FEDORA-2016-65b7608d8b
This update has been submitted for testing by mizdebsk. 3 years ago
This update has been pushed to testing. 3 years ago
This update has reached 7 days in testing and can be pushed to stable now if the maintainer wishes 3 years ago
This update has been submitted for stable by mizdebsk. 3 years ago
This update has been pushed to stable. 3 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Dates
submitted
3 years ago
in testing
3 years ago
in stable
3 years ago
BZ#1308851 CVE-2016-2402 okhttp: certificate pining bypass
0
0
BZ#1308853 CVE-2016-2402 okhttp: certificate pinning bypass [fedora-all]
0
0
BZ#1309109 Update to okio-1.6.0
0
0

Automated Test Results