On 10/25/2013 12:20 AM, Salvatore Bonaccorso wrote:

> CVE-2013-4466[0]:
> gnutls/libdane buffer overflow
> 
> This only affects 3.1.x and 3.2.x so, gnutls28. A patch [1] is
> provided (upstream recomendation is to directly update to 3.2.5, see
> [2]).

Is this relevant for debian, given that we build with --disable-libdane?

btw, it's not clear to me why we --disable-libdane -- I see that it was
set (along with --without-tpm) in 3.1.3-1, but i don't see the reason
for it.  could that be clarified someplace?

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to