[OE-core] [PATCH] openssh: CVE-2011-4327

Scott Garman scott.a.garman at intel.com
Fri Nov 30 22:41:36 UTC 2012


On 11/26/2012 10:13 PM, Li Wang wrote:
> A security flaw was found in the way ssh-keysign,
> a ssh helper program for host based authentication,
> attempted to retrieve enough entropy information on configurations that
> lacked a built-in entropy pool in OpenSSL (a ssh-rand-helper program would
> be executed to retrieve the entropy from the system environment).
> A local attacker could use this flaw to obtain unauthorized access to host keys
> via ptrace(2) process trace attached to the 'ssh-rand-helper' program.
>
> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4327
> http://www.openssh.com/txt/portable-keysign-rand-helper.adv
>
> [YOCTO #3493]
>
> Signed-off-by: Li Wang <li.wang at windriver.com>

Hi Li,

The second link you referenced above explains that the vulnerability 
exists in versions prior to openssh 5.8p2, and yet your patch was 
submitted against openssh 6.0p1. So it seems that this would not apply. 
Or am I misunderstanding the nature of the bug?

Thanks,

Scott

-- 
Scott Garman
Embedded Linux Engineer - Yocto Project
Intel Open Source Technology Center




More information about the Openembedded-core mailing list