The following vulnerability was published for gnutls28.
CVE-2024-0567[0]:
| A vulnerability was found in GnuTLS, where a cockpit (which uses
| gnuTLS) rejects a certificate chain with distributed trust. This
| issue occurs when validating a certificate chain with cockpit-
| certificate-ensure. This flaw allows an unauthenticated, remote
| client or attacker to initiate a denial of service attack.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
Andreas Metzler
unread,
Jan 20, 2024, 7:40:06 AM1/20/24
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to
Hello,
do you plan/would you rather fix these two issues (CVE-2024-0567 and
CVE-2024-0553) by DSA or should I go for a (old)stable update?
TIA, cu Andreas
--
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'
Salvatore Bonaccorso
unread,
Jan 20, 2024, 9:10:05 AM1/20/24
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to
Hi,
On Sat, Jan 20, 2024 at 01:28:33PM +0100, Andreas Metzler wrote:
> Hello,
>
> do you plan/would you rather fix these two issues (CVE-2024-0567 and
> CVE-2024-0553) by DSA or should I go for a (old)stable update?
IMHO they can go as well via the point releases (which should be,
though yet not officially announced) around the 10th of february.
Or is there anything I potentially miss that they warrant a DSA?