Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 498424 - (CVE-2009-1416) CVE-2009-1416 gnutls: All DSA keys generated using GnuTLS 2.6.x are corrupt [GNUTLS-SA-2009-2]
CVE-2009-1416 gnutls: All DSA keys generated using GnuTLS 2.6.x are corrupt [...
Status: CLOSED CURRENTRELEASE
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
http://article.gmane.org/gmane.comp.e...
source=vendorsec,reported=20090423,pu...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2009-04-30 08:45 EDT by Tomas Hoger
Modified: 2009-09-18 15:56 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-09-18 15:56:52 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2009-04-30 08:45:21 EDT
Quoting upstream security advisory:
  http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3516

  When investigating the DSA problems reported by Miroslav Kratochvil,
  Simon Josefsson discovered that all DSA keys generated by
  GnuTLS 2.6.x are corrupt.  Rather than generating a DSA key, GnuTLS
  will generate a RSA key and store it in a DSA structure.

  GnuTLS 2.4.x and earlier did not contain the buggy code.

Fixed upstream in 2.6.6:
  http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3514
Comment 1 Tomas Hoger 2009-04-30 08:48:26 EDT
This issue did not affect versions of gnutls shipped in Red Hat Enterprise Linux 4 and 5, and Fedora up to version 10, as they are based on upstream versions prior to 2.6.  gnutls 2.6.x is currently in F11/Rawhide, mingw32-gnutls based on upstream 2.6.x version is in F10 too.
Comment 2 Vincent Danen 2009-05-01 12:53:35 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-1416 to
the following vulnerability:

Name: CVE-2009-1416
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1416
Assigned: 20090424
Reference: MLIST:[gnutls-devel] 20090430 All DSA keys generated using GnuTLS 2.6.x are corrupt [GNUTLS-SA-2009-2] [CVE-2009-1416]
Reference: URL: http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3516
Reference: MLIST:[help-gnutls] 20090420 Encryption using DSA keys
Reference: URL: http://lists.gnu.org/archive/html/help-gnutls/2009-04/msg00018.html
Reference: SECUNIA:34842
Reference: URL: http://secunia.com/advisories/34842

lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates
RSA keys stored in DSA structures, instead of the intended DSA keys,
which might allow remote attackers to spoof signatures on certificates
or have unspecified other impact by leveraging an invalid DSA key.
Comment 3 Vincent Danen 2009-09-18 15:56:52 EDT
Fedora 11 contains gnutls-2.6.6-1.fc11 so nothing is actually vulnerable to this issue.

Note You need to log in before you can comment on or make changes to this bug.