Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090814213538.GA3469@severus.strandboge.com>
Date: Fri, 14 Aug 2009 16:35:38 -0500
From: Jamie Strandboge <jamie@...onical.com>
To: gnutls-devel@....org, oss-security@...ts.openwall.com
Cc: Jeff Cai <Jeff.Cai@....COM>, Simon Josefsson <simon@...efsson.org>
Subject: GnuTLS CVE-2009-2730 Patches (Was Re: GnuTLS 2.8.2)

On Fri, 14 Aug 2009, Simon Josefsson wrote:

> I don't have time/resources to produce releases for older branches.  If
> someone else wants to volunteer to work on fixing older releases, that
> would be appreciated.
> 

Attached are preliminary patches for 2.4.1, 2.0.4 and 1.2.9 backported
from the advisory[1]. This is a first pass, have only been very lightly
tested and have not been thoroughly looked at (you've been warned). They
are not intended for production use yet, but hopefully others will be
able to use them and provide feedback.

2.0.4 and 1.2.9 needed an additional patch[2] which adds wide wildcard
hostname matching. Ubuntu will likely carry this patch, but it may not
be appropriate for everyone. 2.x passes the nul-in-x509-names.c test
mentioned in the advisory. 1.2.9 does not pass the CN test yet, though
at first glance certtool output looks comparable to the others. These
patches are against Ubuntu sources and not clean tarballs.

Jamie

[1] http://lists.gnu.org/archive/html/help-gnutls/2009-08/msg00011.html
[2] http://git.savannah.gnu.org/cgit/gnutls.git/patch/?id=177e7ddb761999cd8b439e14a2bf43590756e230

-- 
Jamie Strandboge             | http://www.canonical.com

View attachment "CVE-2009-2730_2.4.1.patch" of type "text/x-diff" (8098 bytes)

View attachment "CVE-2009-2730_2.0.4.patch" of type "text/x-diff" (19482 bytes)

View attachment "CVE-2009-2730_1.2.9.patch" of type "text/x-diff" (7274 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.