libcrypt-openssl-dsa-perl does not properly check the return value from the OpenSSL DSA_verify and DSA_do_verify functions, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511519 http://openwall.com/lists/oss-security/2009/01/12/4 http://sourceforge.net/tracker/index.php?func=detail&aid=2545158&group_id=73194&atid=537053 The last is the upstream bug report with an attached patch to fix the issue.
Created attachment 332302 [details] patch from Debian's update to fix the issue
perl-Crypt-OpenSSL-DSA-0.13-12.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/perl-Crypt-OpenSSL-DSA-0.13-12.fc10
perl-Crypt-OpenSSL-DSA-0.13-12.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
This issue was addressed in: Fedora: https://admin.fedoraproject.org/updates/F10/FEDORA-2009-2090 https://admin.fedoraproject.org/updates/F9/FEDORA-2009-1914