[Bug 1207123] Update Released
Colin Watson
cjwatson at canonical.com
Fri Sep 27 11:02:29 UTC 2013
The verification of this Stable Release Update has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regresssions.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to gnutls26 in Ubuntu.
https://bugs.launchpad.net/bugs/1207123
Title:
Key usage violation in certificate has been detected
Status in “gnutls26” package in Ubuntu:
Fix Released
Status in “gnutls26” source package in Precise:
Fix Released
Status in “gnutls26” source package in Quantal:
Fix Released
Bug description:
[Impact]
A certificate issued to allow _only_ a certain ciphersuite (e.g. RSA) gnutls will fail with a key usage violation unless the server explicitly disables all other ciphersuites.
[Test Case]
+ On a 12.04 system install a valid certificate supporting only RSA
+ Configure an ssl enabled website via apache2 using the above certificate
+ Run gnutls-cli <hostname>
[Regression Potential]
The fix for this was pulled from 13.04 and so far no major bugs have been filed relating to this specific issue.
[Additional]
As stated above the attached debdiff(s) for quantal and precise were pulled from 13.04 where the code just ignores this violation and moves on. I don't know of a better way to handle this and perhaps someone with more knowledge around gnutls could provide more insight.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnutls26/+bug/1207123/+subscriptions
More information about the foundations-bugs
mailing list