First published: Tue Mar 04 2014(Updated: )
A flaw was found in libssh server. When accepting a new connection, the server forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not guaranteed to be unique. The most important consequence is that servers using EC (ECDSA) or DSA certificates may under certain conditions leak their private key.
Affected Software | Affected Version | How to fix |
---|---|---|
libssh | ||
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1072191 is considered critical due to potential implications on the randomness in security processes.
To fix REDHAT-BUG-1072191, you should update to the latest version of libssh and OpenSSL that address this vulnerability.
Systems running vulnerable versions of libssh and OpenSSL are affected by REDHAT-BUG-1072191.
REDHAT-BUG-1072191 could potentially be exploited for cryptographic attacks, affecting confidentiality and data integrity.
Currently, the best approach is to apply the available patches rather than looking for workarounds for REDHAT-BUG-1072191.