[libssh/el6] Fix CVE-2014-0017.
asn
asn at fedoraproject.org
Wed Mar 5 14:15:22 UTC 2014
commit b0a4b28eb5d392ded419e82dbf5c785f6edbe75e
Author: Andreas Schneider <asn at cryptomilk.org>
Date: Wed Mar 5 13:58:02 2014 +0100
Fix CVE-2014-0017.
resolves: #1072191
resolves: #1072741
libssh-0.5.5-CVE-2014-0017.patch | 98 ++++++++++++++++++++++++++++++++++++++
libssh.spec | 7 +++
2 files changed, 105 insertions(+), 0 deletions(-)
---
diff --git a/libssh-0.5.5-CVE-2014-0017.patch b/libssh-0.5.5-CVE-2014-0017.patch
new file mode 100644
index 0000000..d8ffcb9
--- /dev/null
+++ b/libssh-0.5.5-CVE-2014-0017.patch
@@ -0,0 +1,98 @@
+commit 48f0bfc70363ca31c8889ca68759e587bc6d7cbd
+Author: Aris Adamantiadis <aris at 0xbadc0de.be>
+AuthorDate: Wed Feb 5 21:24:12 2014 +0100
+Commit: Aris Adamantiadis <aris at 0xbadc0de.be>
+CommitDate: Tue Mar 4 09:54:25 2014 +0100
+
+ security: fix for vulnerability CVE-2014-0017
+
+ When accepting a new connection, a forking server based on libssh forks
+ and the child process handles the request. The RAND_bytes() function of
+ openssl doesn't reset its state after the fork, but simply adds the
+ current process id (getpid) to the PRNG state, which is not guaranteed
+ to be unique.
+ This can cause several children to end up with same PRNG state which is
+ a security issue.
+
+ Conflicts:
+ src/bind.c
+---
+ include/libssh/wrapper.h | 1 +
+ src/bind.c | 3 ++-
+ src/libcrypto.c | 9 +++++++++
+ src/libgcrypt.c | 3 +++
+ 4 files changed, 15 insertions(+), 1 deletion(-)
+
+diff --git a/include/libssh/wrapper.h b/include/libssh/wrapper.h
+index 8c03497..b8cd4d2 100644
+--- a/include/libssh/wrapper.h
++++ b/include/libssh/wrapper.h
+@@ -44,5 +44,6 @@ int crypt_set_algorithms_server(ssh_session session);
+ struct ssh_crypto_struct *crypto_new(void);
+ void crypto_free(struct ssh_crypto_struct *crypto);
+
++void ssh_reseed(void);
+
+ #endif /* WRAPPER_H_ */
+diff --git a/src/bind.c b/src/bind.c
+index cc79f8e..cdcdabe 100644
+--- a/src/bind.c
++++ b/src/bind.c
+@@ -374,7 +374,8 @@ int ssh_bind_accept(ssh_bind sshbind, ssh_session session) {
+ ssh_socket_get_poll_handle_out(session->socket);
+ session->dsa_key = dsa;
+ session->rsa_key = rsa;
+-
++ /* force PRNG to change state in case we fork after ssh_bind_accept */
++ ssh_reseed();
+ return SSH_OK;
+ }
+
+diff --git a/src/libcrypto.c b/src/libcrypto.c
+index f43a91e..0932cbe 100644
+--- a/src/libcrypto.c
++++ b/src/libcrypto.c
+@@ -23,6 +23,7 @@
+ #include <stdlib.h>
+ #include <stdio.h>
+ #include <string.h>
++#include <sys/time.h>
+
+ #include "libssh/priv.h"
+ #include "libssh/session.h"
+@@ -38,6 +39,8 @@
+ #include <openssl/rsa.h>
+ #include <openssl/hmac.h>
+ #include <openssl/opensslv.h>
++#include <openssl/rand.h>
++
+ #ifdef HAVE_OPENSSL_AES_H
+ #define HAS_AES
+ #include <openssl/aes.h>
+@@ -66,6 +69,12 @@ static int alloc_key(struct crypto_struct *cipher) {
+ return 0;
+ }
+
++void ssh_reseed(void){
++ struct timeval tv;
++ gettimeofday(&tv, NULL);
++ RAND_add(&tv, sizeof(tv), 0.0);
++}
++
+ SHACTX sha1_init(void) {
+ SHACTX c = malloc(sizeof(*c));
+ if (c == NULL) {
+diff --git a/src/libgcrypt.c b/src/libgcrypt.c
+index f8fe96f..9a7ea43 100644
+--- a/src/libgcrypt.c
++++ b/src/libgcrypt.c
+@@ -41,6 +41,9 @@ static int alloc_key(struct crypto_struct *cipher) {
+ return 0;
+ }
+
++void ssh_reseed(void){
++ }
++
+ SHACTX sha1_init(void) {
+ SHACTX ctx = NULL;
+ gcry_md_open(&ctx, GCRY_MD_SHA1, 0);
diff --git a/libssh.spec b/libssh.spec
index a80ef38..0160c37 100644
--- a/libssh.spec
+++ b/libssh.spec
@@ -11,6 +11,7 @@ Source0: https://red.libssh.org/attachments/download/51/libssh-0.5.5.tar.
Source1: https://red.libssh.org/attachments/download/50/libssh-0.5.5.tar.asc
Patch0: libssh-0.5.4-disable-latex-documentation.patch
Patch1: libssh-0.5.4-fix-html-doc-generation.patch
+Patch2: libssh-0.5.5-CVE-2014-0017.patch
BuildRequires: cmake
BuildRequires: doxygen
@@ -38,6 +39,8 @@ applications that use %{name}.
%setup -q
%patch0 -p1 -b .disable-latex-documentation
%patch1 -p1 -b .fix-html-doc-generation
+%patch2 -p1 -b .libssh-0.5.5-CVE-2014-0017.patch
+
# Remove examples, they are not packaged and do not build on EPEL 5
sed -i -e 's|add_subdirectory(examples)||g' CMakeLists.txt
rm -fr examples
@@ -86,6 +89,10 @@ rm -rf %{buildroot}
%{_libdir}/libssh_threads.so
%changelog
+* Wed Mar 05 2014 - Andreas Schneider <asn at redhat.com>
+- resolves: #1072191 - Fix CVE-2014-0017.
+- resolves: #1072741 - Fix CVE-2014-0017.
+
* Fri Jul 26 2013 - Andreas Schneider <asn at redhat.com> - 0.5.5-1
- Update to 0.5.5.
- Clenup the spec file.
More information about the scm-commits
mailing list