[OE-core] [PATCH] openssh: CVE-2011-4327
Scott Garman
scott.a.garman at intel.com
Fri Nov 30 22:41:36 UTC 2012
On 11/26/2012 10:13 PM, Li Wang wrote:
> A security flaw was found in the way ssh-keysign,
> a ssh helper program for host based authentication,
> attempted to retrieve enough entropy information on configurations that
> lacked a built-in entropy pool in OpenSSL (a ssh-rand-helper program would
> be executed to retrieve the entropy from the system environment).
> A local attacker could use this flaw to obtain unauthorized access to host keys
> via ptrace(2) process trace attached to the 'ssh-rand-helper' program.
>
> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4327
> http://www.openssh.com/txt/portable-keysign-rand-helper.adv
>
> [YOCTO #3493]
>
> Signed-off-by: Li Wang <li.wang at windriver.com>
Hi Li,
The second link you referenced above explains that the vulnerability
exists in versions prior to openssh 5.8p2, and yet your patch was
submitted against openssh 6.0p1. So it seems that this would not apply.
Or am I misunderstanding the nature of the bug?
Thanks,
Scott
--
Scott Garman
Embedded Linux Engineer - Yocto Project
Intel Open Source Technology Center
More information about the Openembedded-core
mailing list