gnutls vulnerable to CVE-2009-2730
Bug #413136 reported by
Tim Kosse
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
gnutls12 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Dapper |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Hardy |
Invalid
|
Undecided
|
Unassigned | ||
Intrepid |
Invalid
|
Undecided
|
Unassigned | ||
Jaunty |
Invalid
|
Undecided
|
Unassigned | ||
Karmic |
Invalid
|
Undecided
|
Unassigned | ||
gnutls13 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Dapper |
Invalid
|
Undecided
|
Unassigned | ||
Hardy |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Intrepid |
Invalid
|
Undecided
|
Unassigned | ||
Jaunty |
Invalid
|
Undecided
|
Unassigned | ||
Karmic |
Invalid
|
Undecided
|
Unassigned | ||
gnutls26 (Ubuntu) |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Dapper |
Invalid
|
Undecided
|
Unassigned | ||
Hardy |
Invalid
|
Undecided
|
Unassigned | ||
Intrepid |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Jaunty |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Karmic |
Fix Released
|
Undecided
|
Jamie Strandboge |
Bug Description
GnuTLS 2.8.3 fixes a security vulnerability, see CVE-2009-2730
Release notes at http://
visibility: | private → public |
summary: |
- Upgrade to GnuTLS 2.8.3 + gnutls vulnerable to CVE-2009-2730 |
Changed in gnutls26 (Ubuntu Intrepid): | |
status: | New → In Progress |
assignee: | nobody → Jamie Strandboge (jdstrand) |
Changed in gnutls26 (Ubuntu Jaunty): | |
status: | New → In Progress |
assignee: | nobody → Jamie Strandboge (jdstrand) |
Changed in gnutls26 (Ubuntu Karmic): | |
status: | New → In Progress |
assignee: | nobody → Jamie Strandboge (jdstrand) |
Changed in gnutls12 (Ubuntu Hardy): | |
status: | New → Invalid |
Changed in gnutls12 (Ubuntu Intrepid): | |
status: | New → Invalid |
Changed in gnutls12 (Ubuntu Jaunty): | |
status: | New → Invalid |
Changed in gnutls12 (Ubuntu Karmic): | |
status: | New → Invalid |
Changed in gnutls13 (Ubuntu Dapper): | |
status: | New → Invalid |
Changed in gnutls13 (Ubuntu Intrepid): | |
status: | New → Invalid |
Changed in gnutls13 (Ubuntu Jaunty): | |
status: | New → Invalid |
Changed in gnutls13 (Ubuntu Karmic): | |
status: | New → Invalid |
Changed in gnutls26 (Ubuntu Dapper): | |
status: | New → Invalid |
Changed in gnutls26 (Ubuntu Hardy): | |
status: | New → Invalid |
Changed in gnutls13 (Ubuntu Hardy): | |
status: | New → In Progress |
assignee: | nobody → Jamie Strandboge (jdstrand) |
Changed in gnutls12 (Ubuntu Dapper): | |
status: | New → In Progress |
assignee: | nobody → Jamie Strandboge (jdstrand) |
Changed in gnutls26 (Ubuntu Intrepid): | |
status: | In Progress → Fix Committed |
Changed in gnutls26 (Ubuntu Jaunty): | |
status: | In Progress → Fix Committed |
Changed in gnutls13 (Ubuntu Hardy): | |
status: | In Progress → Fix Committed |
Changed in gnutls12 (Ubuntu Dapper): | |
status: | In Progress → Fix Committed |
To post a comment you must log in.
This bug was fixed in the package gnutls26 - 2.6.6-1ubuntu1
---------------
gnutls26 (2.6.6-1ubuntu1) karmic; urgency=low
* SECURITY UPDATE: fix improper handling of '\0' in Common Name (CN) and patches/ 16_CVE- 2009-2730. diff: verify length of CN and SAN
Subject Alternative Name (SAN) in X.509 certificates (LP: #413136)
- debian/
are what we expect and error out if either contains an embedded \0
- CVE-2009-2730
-- Jamie Strandboge <email address hidden> Fri, 14 Aug 2009 09:55:54 -0500