On 2014-06-25 Kurt Roeckx <k...@roeckx.be> wrote:
> Package: lynx-cur, libgnutls26
> Severity: serious
> Tags: security

> Hi,

> There is a test site for checking the gnutls bug:
> https://gnutls.notary.icsi.berkeley.edu/

> I can connect to it and get the message:
>    If you see this without getting a certificate error you are
>    vulnerable against the GnuTLS bug
[...]

Hello Kurt,

afaiui this site checks for CVE-2014-0092, not CVE-2014-1959, and
indeed an important difference comes up when comparing
gnutls-cli -p 443 gnutls.notary.icsi.berkeley.edu --x509cafile \
/etc/ssl/certs/ca-certificates.crt
with libgnutls26_2.12.20-8 and libgnutls26_2.12.20-8+deb7u1. The older
unfixed version connects successfully and trust the certificate, the
newer one does not.

Also for reference reproducing the issue on current sid/testing
requires downgrading libtasn1-6 to <= 3.2-1.

cu Andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to