On 2009-08-14 Giuseppe Iuculano <giuse...@iuculano.it> wrote:
> Package: gnutls26
> Severity: serious
> Tags: security

> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for gnutls26.

> CVE-2009-2730[0]:
> | libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0'
> | character in a domain name in the subject's (1) Common Name (CN) or
> | (2) Subject Alternative Name (SAN) field of an X.509 certificate,
> | which allows man-in-the-middle attackers to spoof arbitrary SSL
> | servers via a crafted certificate issued by a legitimate Certification
> | Authority.

> If you fix the vulnerability please also make sure to include the
> CVE id in your changelog entry.

> Could you check if gnutls13 is affected please?

> For further information see:

> [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2730
>     http://security-tracker.debian.net/tracker/CVE-2009-2730

> Cheers,
> Giuseppe.

Jamie Strandboge has generated patches for older versions of gnutls
and posted them in 
http://lists.gnu.org/archive/html/gnutls-devel/2009-08/msg00065.html

The patch for 2.4.x applies cleanly to the lenny release and seems to
fix the issue. - None of these apply to the etch-version, though.
cu andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to