Bug 1065092 (CVE-2014-1959)
Summary: | CVE-2014-1959 gnutls: incorrect handling of V1 intermediate certificates (GNUTLS-SA-2014-1) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ametzler, erik-fedora, hkario, jkurik, jorton, ktietz, mike, nmavrogi, pfrields, rjones, seceng-idm-qe-list, tmraz |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | gnutls 3.1.21, gnutls 3.2.11 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-03-03 10:11:35 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1065094, 1065095, 1065096, 1066849 | ||
Bug Blocks: | 1065093 |
Description
Vincent Danen
2014-02-13 22:14:49 UTC
Created mingw-gnutls tracking bugs for this issue: Affects: fedora-all [bug 1065096] Created gnutls tracking bugs for this issue: Affects: fedora-all [bug 1065094] Created mingw32-gnutls tracking bugs for this issue: Affects: epel-5 [bug 1065095] (In reply to Vincent Danen from comment #0) > At a quick look at the code of GnuTLS 2.8.5, it is affected. 1.4.1 looks > affected to me as well. The issue was introduced when v1 root certificates were allowed by default (2.11.5). Thus gnutls 2.8.5 or earlier are not affected since they do not allow X.509 v1 certificates by default. Nikos, do you have any certificates that can easily be used to test this? Possibly something in the upstream test suite you'd recommend looking at? I use the chain: https://gitorious.org/gnutls/gnutls/source/bd4ba0556de1120adfa1ce10caaeeaead49b323a:tests/chainverify.c#L52 It is a list of 3 certificates with a CA of version 1 as intermediate. gnutls-3.1.20-3.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. gnutls-3.1.20-3.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. mingw-gnutls-3.1.21-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. mingw-gnutls-3.1.21-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. As mentioned in comment 11, this problem was introduced in upstream version 2.11.5. Therefore this did not affect gnutls packages as shipped with Red Hat Enterprise Linux 5 and 6. However, GnuTLS versions before 2.7.6 contained a different bug that had similar effect of making GnuTLS accept version 1 certificates as valid intermediate CA certificates when using default verification flags. That issue was assigned a different id CVE-2009-5138 and is tracked via bug 1069301. Statement: Not vulnerable. This issue did not affect the versions of gnutls as shipped with Red Hat Enterprise Linux 5 and 6. |