1 |
See the following advisory. I committed a 0.9.6b ebuild. Might not be a |
2 |
bad idea to upgrade. You'll need to recompile all things that are linked |
3 |
against libssl most likely. But since the bug is relativley easy to |
4 |
exploit it's not a bad idea to go through the minimal hassle. |
5 |
|
6 |
|
7 |
----- Forwarded message from EnGarde Secure Linux <security@×××××××××××××××.com> ----- |
8 |
|
9 |
From: EnGarde Secure Linux <security@×××××××××××××××.com> |
10 |
Message-ID: <Pine.LNX.4.10.10107101355330.17594-100000@×××××××××××××××××××××××××××××××××.com> |
11 |
Date: Tue, 10 Jul 2001 13:55:59 -0400 (EDT) |
12 |
To: engarde-security@×××××××××××××××.com, bugtraq@×××××××××××××.com |
13 |
Subject: [ESA-20010709-01] OpenSSL PRNG Weakness |
14 |
|
15 |
-----BEGIN PGP SIGNED MESSAGE----- |
16 |
Hash: SHA1 |
17 |
|
18 |
|
19 |
+------------------------------------------------------------------------+ |
20 |
| EnGarde Secure Linux Security Advisory July 09, 2001 | |
21 |
| http://www.engardelinux.org/ ESA-20010709-01 | |
22 |
| | |
23 |
| Package: openssl | |
24 |
| Summary: There is a design weakness in OpenSSL's PRNG. | |
25 |
+------------------------------------------------------------------------+ |
26 |
|
27 |
EnGarde Secure Linux is a secure distribution of Linux that features |
28 |
improved access control, host and network intrusion detection, Web |
29 |
based secure remote management, complete e-commerce using AllCommerce, |
30 |
and integrated open source security tools. |
31 |
|
32 |
|
33 |
OVERVIEW |
34 |
- -------- |
35 |
A weakness exists in the pseudo-random number generator (PRNG) in all |
36 |
version of OpenSSL up to and including 0.9.6a. Given knowledge of |
37 |
past results of PRNG queries an attacker can predict future results. |
38 |
|
39 |
|
40 |
DETAIL |
41 |
- ------ |
42 |
There is a design error in OpenSSL's PRNG which can allow an attacker to |
43 |
determine the internal state of the PRNG. Based on the output of |
44 |
several hundered 1-byte PRNG requests an attacker can reconstruct the |
45 |
PRNG's internal state and predict future PRNG output. |
46 |
|
47 |
The impact of this vulnerability is rather small, as the OpenSSL team |
48 |
has described: |
49 |
|
50 |
"It is unlikely for applications to request PRNG bytes in a pattern |
51 |
allowing for the attack against the OpenSSL PRNG. Typically, |
52 |
applications will request PRNG bytes in larger chunks. |
53 |
No applications is known to us which is actually vulnerable." |
54 |
|
55 |
In any event, we highly recommend that all users upgrade to the latest |
56 |
openssl packages as outlined in this advisory. |
57 |
|
58 |
|
59 |
SOLUTION |
60 |
- -------- |
61 |
All users should upgrade to the most recent version, as outlined in |
62 |
this advisory. |
63 |
|
64 |
Guardian Digital recently made available the Guardian Digital Secure |
65 |
Update, a means to proactively keep systems secure and manage |
66 |
system software. EnGarde users can automatically update their system |
67 |
using the Guardian Digital WebTool secure interface. |
68 |
|
69 |
If choosing to manually upgrade this package, updates can be |
70 |
obtained from: |
71 |
|
72 |
ftp://ftp.engardelinux.org/pub/engarde/stable/updates/ |
73 |
http://ftp.engardelinux.org/pub/engarde/stable/updates/ |
74 |
|
75 |
Before upgrading the package, the machine must either: |
76 |
|
77 |
a) be booted into a "standard" kernel; or |
78 |
b) have LIDS disabled. |
79 |
|
80 |
To disable LIDS, execute the command: |
81 |
|
82 |
# /sbin/lidsadm -S -- -LIDS_GLOBAL |
83 |
|
84 |
To install the updated package, execute the command: |
85 |
|
86 |
# rpm -Uvh <filename> |
87 |
|
88 |
To reload the LIDS configuration, execute the command: |
89 |
|
90 |
# /usr/sbin/config_lids.pl |
91 |
|
92 |
To re-enable LIDS (if it was disabled), execute the command: |
93 |
|
94 |
# /sbin/lidsadm -S -- +LIDS_GLOBAL |
95 |
|
96 |
To verify the signature of the updated packages, execute the command: |
97 |
|
98 |
# rpm -Kv <filename> |
99 |
|
100 |
|
101 |
UPDATED PACKAGES |
102 |
- ---------------- |
103 |
These updated packages are for EnGarde Secure Linux 1.0.1 (Finestra). |
104 |
|
105 |
Source Packages: |
106 |
|
107 |
SRPMS/openssl-0.9.6-1.0.14.src.rpm |
108 |
MD5 Sum: 420d7e9d0687f313059a64935be6f550 |
109 |
|
110 |
i386 Binary Packages: |
111 |
|
112 |
i386/openssl-0.9.6-1.0.14.i386.rpm |
113 |
MD5 Sum: 347000c0645194ab5feb83eb92d2355c |
114 |
|
115 |
i386/openssl-devel-0.9.6-1.0.14.i386.rpm |
116 |
MD5 Sum: 09125870402b05ad8ab75d74271893a3 |
117 |
|
118 |
i386/openssl-misc-0.9.6-1.0.14.i386.rpm |
119 |
MD5 Sum: e865af2f976115e92f99a6ce7fd1cb1b |
120 |
|
121 |
i386 Binary Packages: |
122 |
|
123 |
i686/openssl-0.9.6-1.0.14.i686.rpm |
124 |
MD5 Sum: 4d612208e3952bdb375ad36e614abf98 |
125 |
|
126 |
i686/openssl-devel-0.9.6-1.0.14.i686.rpm |
127 |
MD5 Sum: 8a1b228357a1fe51a96aeb9afa3981f2 |
128 |
|
129 |
i686/openssl-misc-0.9.6-1.0.14.i686.rpm |
130 |
MD5 Sum: 1e5eb36c5db32a79dbdfccb3899ae9dc |
131 |
|
132 |
|
133 |
REFERENCES |
134 |
- ---------- |
135 |
|
136 |
Guardian Digital's public key: |
137 |
http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY |
138 |
|
139 |
Credit for the discovery of this bug goes to: |
140 |
Markku-Juhani O. Saarinen <markku-juhani.saarinen@×××××.com> |
141 |
|
142 |
OpenSSL's Official Web Site: |
143 |
http://www.openssl.org/ |
144 |
|
145 |
|
146 |
- -------------------------------------------------------------------------- |
147 |
$Id: ESA-20010709-01-openssl,v 1.2 2001/07/10 15:34:45 rwm Exp rwm $ |
148 |
- -------------------------------------------------------------------------- |
149 |
Author: Ryan W. Maple, <ryan@×××××××××××××××.com> |
150 |
Copyright 2001, Guardian Digital, Inc. |
151 |
|
152 |
-----BEGIN PGP SIGNATURE----- |
153 |
Version: GnuPG v1.0.4 (GNU/Linux) |
154 |
Comment: For info see http://www.gnupg.org |
155 |
|
156 |
iD8DBQE7S0G2HD5cqd57fu0RAvYnAJ9nT8oqtjJMsQXv4r/Cl2UYv6iewACfWOJR |
157 |
AR3Xr0NnQnISu9+XUS1CS/E= |
158 |
=6l9n |
159 |
-----END PGP SIGNATURE----- |
160 |
|
161 |
----- End forwarded message ----- |
162 |
|
163 |
-- |
164 |
Ben Lutgens |
165 |
Sistina Software Inc. |
166 |
Kernel panic: I have no root and I want to scream |