CVE-2009-0130

NameCVE-2009-0130
Descriptionlib/crypto/c_src/crypto_drv.c in erlang does not properly check the return value from the OpenSSL DSA_do_verify function, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. NOTE: a package maintainer disputes this issue, reporting that there is a proper check within the only code that uses the applicable part of crypto_drv.c, and thus "this report is invalid.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs511520

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
erlang (PTS)jessie, jessie (lts)1:17.3-dfsg-4+deb8u2vulnerable
stretch (security)1:19.2.1+dfsg-2+deb9u1vulnerable
stretch (lts), stretch1:19.2.1+dfsg-2+really23.3.4.18-0+deb9u2vulnerable
buster1:21.2.6+dfsg-1vulnerable
buster (security)1:22.2.7+dfsg-1+deb10u1vulnerable
bullseye1:23.2.6+dfsg-1+deb11u1vulnerable
bookworm1:25.2.3+dfsg-1vulnerable
trixie1:25.3.2.8+dfsg-1vulnerable
sid1:25.3.2.10+dfsg-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
erlangsource(unstable)(unfixed)unimportant511520

Notes

the return value is passed to the caller (lib/crypto/src/crypto.erl) which
only return success in case of DSA_do_verify returning 1 and failure otherwise
this is likely to be rejected

Search for package or bug name: Reporting problems