|
|
Log in / Subscribe / Register

mod-gnutls: restriction bypass

Package(s):mod-gnutls CVE #(s):CVE-2015-2091
Created:March 11, 2015 Updated:March 16, 2015
Description: From the Debian advisory:

Thomas Klute discovered that in mod-gnutls, an Apache module providing SSL and TLS encryption with GnuTLS, a bug caused the server's client verify mode not to be considered at all, in case the directory's configuration was unset. Clients with invalid certificates were then able to leverage this flaw in order to get access to that directory.

Alerts:
Debian DSA-3177-1 mod-gnutls 2015-03-10
Debian-LTS DLA-170-1 mod-gnutls 2015-03-14

to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds