Bug 504979 - (CVE-2009-1390) CVE-2009-1390 Mutt 1.5.19 SSL chain verification flaw
CVE-2009-1390 Mutt 1.5.19 SSL chain verification flaw
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On:
  Show dependency treegraph
Reported: 2009-06-10 05:55 EDT by Tomas Hoger
Modified: 2009-06-16 02:54 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2009-06-16 02:54:20 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2009-06-10 05:55:04 EDT
Mutt version 1.5.19 introduced a support for intermediate CA certs,
available when mutt is linked against both OpenSSL and GnuTLS, added
via upstream commits:


Miroslav Lichvar noticed that a certificate chain validation was not
implemented properly.  Individual certificates in the chain where
checked and accepted, but the chain as a whole as not validated

Issue was addressed via following upstream patches:

Comment 1 Tomas Hoger 2009-06-10 05:58:29 EDT
This issue only affects mutt 1.5.19, version of mutt shipped in Red Hat Enterprise Linux 3, 4, and 5, and Fedora 9 and 10 are not affected by this problem.
Comment 2 Fedora Update System 2009-06-15 22:41:22 EDT
mutt-1.5.19-5.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.