bin/163951: bundled openssl seems to miss fix for a CVE-2011-1945
Volodymyr Kostyrko
c.kworr at gmail.com
Mon Jan 9 09:40:16 UTC 2012
>Number: 163951
>Category: bin
>Synopsis: bundled openssl seems to miss fix for a CVE-2011-1945
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: freebsd-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Mon Jan 09 09:40:15 UTC 2012
>Closed-Date:
>Last-Modified:
>Originator: Volodymyr Kostyrko
>Release: RELENG_9
>Organization:
>Environment:
FreeBSD green.tandem.local 9.0-STABLE FreeBSD 9.0-STABLE #0 r229848: Mon Jan 9 10:58:48 EET 2012 arcade at green.tandem.local:/usr/obj/usr/src/sys/MINIMAL_4BSD amd64
>Description:
Recently I started to recheck usability of ssh keys and found that ECDSA keys are already available. I've tried to make one and it points me about key bit length. Reading about this on
http://en.wikipedia.org/wiki/Elliptic_Curve_DSA
I also noticed that a timing attack is possible against OpenSSL. Quick checking the code shows that we haven't integrated the fix yet as current revision of
http://svnweb.freebsd.org/base/stable/9/crypto/openssl/crypto/ecdsa/ecs_ossl.c?revision=225736&view=markup
http://svnweb.freebsd.org/base/head/crypto/openssl/crypto/ecdsa/ecs_ossl.c?revision=225736&view=markup
misses the fix from:
http://cvs.openssl.org/chngview?cn=20892
And after latest OpenSSH import by des:
http://svnweb.freebsd.org/base?view=revision&revision=221420
we are automatically creating (and using?) private ECDSA key:
http://svnweb.freebsd.org/base/stable/9/etc/rc.d/sshd?r1=221419&r2=221420&
>How-To-Repeat:
>Fix:
Import fix from http://cvs.openssl.org/chngview?cn=20892
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-bugs
mailing list