This bug was fixed in the package gnutls13 - 2.0.4-1ubuntu2.6 --------------- gnutls13 (2.0.4-1ubuntu2.6) hardy-security; urgency=low
* SECURITY UPDATE: fix improper handling of '\0' in Common Name (CN) and Subject Alternative Name (SAN) in X.509 certificates (LP: #413136) - debian/patches/91_CVE-2009-2730.diff: verify length of CN and SAN are what we expect and error out if either contains an embedded \0. This fixed required updating _gnutls_hostname_compare() in lib/x509/rfc2818_hostname.c to support wide wildcard hostname matching. This is a backward compatible change and which only adds additional matching of hostnames. - CVE-2009-2730 -- Jamie Strandboge <ja...@ubuntu.com> Fri, 14 Aug 2009 14:57:08 -0500 -- gnutls vulnerable to CVE-2009-2730 https://bugs.launchpad.net/bugs/413136 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs