On Tue, Mar 22, 2011 at 12:57:17PM +1100, david b wrote:
> Package: mutt
> Version: 1.5.20-9+squeeze1
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> The gnutls implementation of ssl found in mutt, in mutt_ssl_gnutls.c, appears 
> to not validate
> the common name of a remote server correctly. The openssl implementation  
> found in mutt_ssl.c
> does perform this check correctly.
> Can the mutt package be re-build against openssl and not gnutls.
> 
> This bug is reported  upstream at http://dev.mutt.org/trac/ticket/3506.

Is there a CVE for this?

Cheers
Antonio



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to