Bug 691400 (CVE-2011-4327) - VUL-0: CVE-2011-4327: openssh: local private host key compromise on platforms without host-level randomness support
Summary: VUL-0: CVE-2011-4327: openssh: local private host key compromise on platforms...
Status: RESOLVED INVALID
Alias: CVE-2011-4327
Product: SUSE Security Incidents
Classification: Novell Products
Component: General (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Petr Cerny
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:NVD:CVE-2011-4327:2.1:(AV:L/A...
Keywords:
Depends on:
Blocks:
 
Reported: 2011-05-03 11:25 UTC by Thomas Biege
Modified: 2020-04-02 02:21 UTC (History)
2 users (show)

See Also:
Found By: Development
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2011-05-03 11:25:15 UTC
Hi.
There is a security bug in package 'openssh'.

This bug is public.

There is no coordinated release date (CRD) set.

More information can be found here:
	http://www.openssh.com/txt/release-5.8p2


Original posting:



http://www.openssh.com/txt/release-5.8p2

Changes since OpenSSH 5.8p1
===========================

Security:

 * Fix local private host key compromise on platforms without host-
   level randomness support (e.g. /dev/random) reported by Tomas Mraz

   On hosts that did not have a randomness source configured in
   OpenSSL and were not configured to use EGD/PRNGd (using the
   --with-prngd-socket configure option), the ssh-rand-helper command
   was being implicitly executed by ssh-keysign with open file
   descriptors to the host private keys. An attacker could use
   ptrace(2) to attach to ssh-rand-helper and exfiltrate the keys.

   Most modern operating systems are not vulnerable. In particular,
   *BSD, Linux, OS X and Cygwin do not use ssh-rand-helper.

   A full advisory for this issue is available at:
   http://www.openssh.com/txt/portable-keysign-rand-helper.adv
Comment 1 Petr Cerny 2011-05-03 14:31:07 UTC
We do not even ship the affected binary - is there anything to be done?
Comment 2 Thomas Biege 2011-05-03 14:44:34 UTC
Thanks.
Comment 3 Marcus Meissner 2011-11-21 16:39:50 UTC
CVE-2011-4327