lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 20 Sep 2006 17:26:00 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2006:166 ] - Updated gnutls packages fixes PKCS signature verification issue.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:166
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : gnutls
 Date    : September 19, 2006
 Affected: 2006.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3,
 does not properly handle excess data in the digestAlgorithm.parameters
 field when generating a hash, which allows remote attackers to forge a
 PKCS #1 v1.5 signature that is signed by that RSA key and prevents
 GnuTLS from correctly verifying X.509 and other certificates that use
 PKCS, a variant of CVE-2006-4339.

 The provided packages have been patched to correct this issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 7cb7aa3309af51dc44ca8bc9f855bb9b  2006.0/i586/gnutls-1.0.25-2.2.20060mdk.i586.rpm
 e30b5de1b0500830cfbcfbb7a845967d  2006.0/i586/libgnutls11-1.0.25-2.2.20060mdk.i586.rpm
 ddbe8a9d665b50a4614fee5251a8dc39  2006.0/i586/libgnutls11-devel-1.0.25-2.2.20060mdk.i586.rpm 
 aea1556e219f37a6f4be8dadce721830  2006.0/SRPMS/gnutls-1.0.25-2.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 bd9f806eb2319b5d258d142154011650  2006.0/x86_64/gnutls-1.0.25-2.2.20060mdk.x86_64.rpm
 b8046dacc5e4fd5cd11acd7139fba8d9  2006.0/x86_64/lib64gnutls11-1.0.25-2.2.20060mdk.x86_64.rpm
 f26c571f9379dcae4efe5ccb5ddd1bce  2006.0/x86_64/lib64gnutls11-devel-1.0.25-2.2.20060mdk.x86_64.rpm
 e30b5de1b0500830cfbcfbb7a845967d  2006.0/x86_64/libgnutls11-1.0.25-2.2.20060mdk.i586.rpm
 ddbe8a9d665b50a4614fee5251a8dc39  2006.0/x86_64/libgnutls11-devel-1.0.25-2.2.20060mdk.i586.rpm 
 aea1556e219f37a6f4be8dadce721830  2006.0/SRPMS/gnutls-1.0.25-2.2.20060mdk.src.rpm

 Corporate 4.0:
 a2254e8a31891b8bcc609f3cf13c62bb  corporate/4.0/i586/gnutls-1.0.25-2.2.20060mlcs4.i586.rpm
 41b00f4035f895b1e7b51522d1b31342  corporate/4.0/i586/libgnutls11-1.0.25-2.2.20060mlcs4.i586.rpm
 2e74d9730bb73ec4cd4ccd584bd184b9  corporate/4.0/i586/libgnutls11-devel-1.0.25-2.2.20060mlcs4.i586.rpm 
 1e1ff2a8e7eabe7d152c98076f564476  corporate/4.0/SRPMS/gnutls-1.0.25-2.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 05843e5fd72d31c80c5d8218cf18d812  corporate/4.0/x86_64/gnutls-1.0.25-2.2.20060mlcs4.x86_64.rpm
 112708823292a1f1ca17fa68daac8373  corporate/4.0/x86_64/lib64gnutls11-1.0.25-2.2.20060mlcs4.x86_64.rpm
 a0eaae0c87a0a56ef69a11c8db598fb8  corporate/4.0/x86_64/lib64gnutls11-devel-1.0.25-2.2.20060mlcs4.x86_64.rpm
 41b00f4035f895b1e7b51522d1b31342  corporate/4.0/x86_64/libgnutls11-1.0.25-2.2.20060mlcs4.i586.rpm
 2e74d9730bb73ec4cd4ccd584bd184b9  corporate/4.0/x86_64/libgnutls11-devel-1.0.25-2.2.20060mlcs4.i586.rpm 
 1e1ff2a8e7eabe7d152c98076f564476  corporate/4.0/SRPMS/gnutls-1.0.25-2.2.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFEawJmqjQ0CJFipgRAqFdAKC44hSOcU7Pqbt7V0XHz9HHDIKbqwCfUWK1
FGp443EESX1+sjPf4EDaEwQ=
=Lqox
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ