gnutls13 oldstable update for CVE-2009-1417

Giuseppe Iuculano giuseppe at iuculano.it
Wed Jun 3 17:57:59 UTC 2009


Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for gnutls13 some time ago.


CVE-2009-1417[0]:
| gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and
| expiration times of X.509 certificates, which allows remote attackers
| to successfully present a certificate that is (1) not yet valid or (2)
| no longer valid, related to lack of time checks in the
| _gnutls_x509_verify_certificate function in lib/x509/verify.c in
| libgnutls_x509, as used by (a) Exim, (b) OpenLDAP, and (c) libsoup.


Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian oldstable. It does
not warrant a DSA.

However it would be nice if this could get fixed via a regular point update[1].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.


For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1417
    http://security-tracker.debian.net/tracker/CVE-2009-1417
[1] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable


Kind regards
Giuseppe.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnutls-maint/attachments/20090603/a3978d2b/attachment.pgp>


More information about the Pkg-gnutls-maint mailing list