On Sun, Sep 11, 2016 at 5:41 PM, Leo Famulari <l...@famulari.name> wrote:
> There is a GnuTLS security advisory [0] regarding "an issue that affects
> validation of certificates using OCSP responses, which can falsely
> report a certificate as valid under certain circumstances."
>
> I updated GnuTLS on core-updates to 3.5.4, the latest release of the 3.5
> series.
>
> For master, the naive approach of cherry-picking the patch [1] did not
> work; the test 'system-prio-file' fails consistently with that change. I
> could instead try grafting the updated version.
>
> What do you think? The authors seem to think it's a relatively minor
> issue [2], since exploiting it requires an attacker to compromise the
> certificate authority.

Side questions (just for my curiosity's sake):

- What does it cost (manpower, hydra build time, etc...) approximatively
to do a new release ?

- Is it sufficiently automated ?
- Can we help ?

-- 
Vincent Legoll

Reply via email to