[libssh/el6] Fix CVE-2014-0017.

asn asn at fedoraproject.org
Wed Mar 5 14:15:22 UTC 2014


commit b0a4b28eb5d392ded419e82dbf5c785f6edbe75e
Author: Andreas Schneider <asn at cryptomilk.org>
Date:   Wed Mar 5 13:58:02 2014 +0100

    Fix CVE-2014-0017.
    
    resolves: #1072191
    resolves: #1072741

 libssh-0.5.5-CVE-2014-0017.patch |   98 ++++++++++++++++++++++++++++++++++++++
 libssh.spec                      |    7 +++
 2 files changed, 105 insertions(+), 0 deletions(-)
---
diff --git a/libssh-0.5.5-CVE-2014-0017.patch b/libssh-0.5.5-CVE-2014-0017.patch
new file mode 100644
index 0000000..d8ffcb9
--- /dev/null
+++ b/libssh-0.5.5-CVE-2014-0017.patch
@@ -0,0 +1,98 @@
+commit 48f0bfc70363ca31c8889ca68759e587bc6d7cbd
+Author:     Aris Adamantiadis <aris at 0xbadc0de.be>
+AuthorDate: Wed Feb 5 21:24:12 2014 +0100
+Commit:     Aris Adamantiadis <aris at 0xbadc0de.be>
+CommitDate: Tue Mar 4 09:54:25 2014 +0100
+
+    security: fix for vulnerability CVE-2014-0017
+    
+    When accepting a new connection, a forking server based on libssh forks
+    and the child process handles the request. The RAND_bytes() function of
+    openssl doesn't reset its state after the fork, but simply adds the
+    current process id (getpid) to the PRNG state, which is not guaranteed
+    to be unique.
+    This can cause several children to end up with same PRNG state which is
+    a security issue.
+    
+    Conflicts:
+    	src/bind.c
+---
+ include/libssh/wrapper.h | 1 +
+ src/bind.c               | 3 ++-
+ src/libcrypto.c          | 9 +++++++++
+ src/libgcrypt.c          | 3 +++
+ 4 files changed, 15 insertions(+), 1 deletion(-)
+
+diff --git a/include/libssh/wrapper.h b/include/libssh/wrapper.h
+index 8c03497..b8cd4d2 100644
+--- a/include/libssh/wrapper.h
++++ b/include/libssh/wrapper.h
+@@ -44,5 +44,6 @@ int crypt_set_algorithms_server(ssh_session session);
+ struct ssh_crypto_struct *crypto_new(void);
+ void crypto_free(struct ssh_crypto_struct *crypto);
+ 
++void ssh_reseed(void);
+ 
+ #endif /* WRAPPER_H_ */
+diff --git a/src/bind.c b/src/bind.c
+index cc79f8e..cdcdabe 100644
+--- a/src/bind.c
++++ b/src/bind.c
+@@ -374,7 +374,8 @@ int ssh_bind_accept(ssh_bind sshbind, ssh_session session) {
+   ssh_socket_get_poll_handle_out(session->socket);
+   session->dsa_key = dsa;
+   session->rsa_key = rsa;
+-
++  /* force PRNG to change state in case we fork after ssh_bind_accept */
++  ssh_reseed();
+   return SSH_OK;
+ }
+ 
+diff --git a/src/libcrypto.c b/src/libcrypto.c
+index f43a91e..0932cbe 100644
+--- a/src/libcrypto.c
++++ b/src/libcrypto.c
+@@ -23,6 +23,7 @@
+ #include <stdlib.h>
+ #include <stdio.h>
+ #include <string.h>
++#include <sys/time.h>
+ 
+ #include "libssh/priv.h"
+ #include "libssh/session.h"
+@@ -38,6 +39,8 @@
+ #include <openssl/rsa.h>
+ #include <openssl/hmac.h>
+ #include <openssl/opensslv.h>
++#include <openssl/rand.h>
++
+ #ifdef HAVE_OPENSSL_AES_H
+ #define HAS_AES
+ #include <openssl/aes.h>
+@@ -66,6 +69,12 @@ static int alloc_key(struct crypto_struct *cipher) {
+     return 0;
+ }
+ 
++void ssh_reseed(void){
++    struct timeval tv;
++    gettimeofday(&tv, NULL);
++    RAND_add(&tv, sizeof(tv), 0.0);
++}
++
+ SHACTX sha1_init(void) {
+   SHACTX c = malloc(sizeof(*c));
+   if (c == NULL) {
+diff --git a/src/libgcrypt.c b/src/libgcrypt.c
+index f8fe96f..9a7ea43 100644
+--- a/src/libgcrypt.c
++++ b/src/libgcrypt.c
+@@ -41,6 +41,9 @@ static int alloc_key(struct crypto_struct *cipher) {
+     return 0;
+ }
+ 
++void ssh_reseed(void){
++	}
++
+ SHACTX sha1_init(void) {
+   SHACTX ctx = NULL;
+   gcry_md_open(&ctx, GCRY_MD_SHA1, 0);
diff --git a/libssh.spec b/libssh.spec
index a80ef38..0160c37 100644
--- a/libssh.spec
+++ b/libssh.spec
@@ -11,6 +11,7 @@ Source0:        https://red.libssh.org/attachments/download/51/libssh-0.5.5.tar.
 Source1:        https://red.libssh.org/attachments/download/50/libssh-0.5.5.tar.asc
 Patch0:         libssh-0.5.4-disable-latex-documentation.patch
 Patch1:         libssh-0.5.4-fix-html-doc-generation.patch
+Patch2:         libssh-0.5.5-CVE-2014-0017.patch
 
 BuildRequires:  cmake
 BuildRequires:  doxygen
@@ -38,6 +39,8 @@ applications that use %{name}.
 %setup -q
 %patch0 -p1 -b .disable-latex-documentation
 %patch1 -p1 -b .fix-html-doc-generation
+%patch2 -p1 -b .libssh-0.5.5-CVE-2014-0017.patch
+
 # Remove examples, they are not packaged and do not build on EPEL 5
 sed -i -e 's|add_subdirectory(examples)||g' CMakeLists.txt
 rm -fr examples
@@ -86,6 +89,10 @@ rm -rf %{buildroot}
 %{_libdir}/libssh_threads.so
 
 %changelog
+* Wed Mar 05 2014 - Andreas Schneider <asn at redhat.com>
+- resolves: #1072191 - Fix CVE-2014-0017.
+- resolves: #1072741 - Fix CVE-2014-0017.
+
 * Fri Jul 26 2013 - Andreas Schneider <asn at redhat.com> - 0.5.5-1
 - Update to 0.5.5.
 - Clenup the spec file.


More information about the scm-commits mailing list