Bug 498423 (CVE-2009-1415)
Summary: | CVE-2009-1415 gnutls: Double free and free of invalid pointer on certain errors [GNUTLS-SA-2009-1] | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | berrange, jorton, rjones, tmraz, vdanen |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3515 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-09-18 19:57:30 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Tomas Hoger
2009-04-30 12:41:43 UTC
This issue did not affect versions of gnutls shipped in Red Hat Enterprise Linux 4 and 5, and Fedora up to version 10, as they are based on upstream versions prior to 2.6. gnutls 2.6.x is currently in F11/Rawhide, mingw32-gnutls based on upstream 2.6.x version is in F10 too. Common Vulnerabilities and Exposures assigned an identifier CVE-2009-1415 to the following vulnerability: Name: CVE-2009-1415 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1415 Assigned: 20090424 Reference: MLIST:[gnutls-devel] 20090423 Re: some crashes on using DSA keys Reference: URL: http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3502 Reference: MLIST:[gnutls-devel] 20090430 Double free and free of invalid pointer on certain errors [GNUTLS-SA-2009-1] [CVE-2009-1415] Reference: URL: http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3515 Reference: CONFIRM: http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3488 Reference: SECUNIA:34842 Reference: URL: http://secunia.com/advisories/34842 lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free. Fedora 11 contains gnutls-2.6.6-1.fc11 so there is nothing actually vulnerable to this issue. |