Bug 41498 - libssh: Insecure PRNG seeding (3.3)
Summary: libssh: Insecure PRNG seeding (3.3)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 3.3
Hardware: Other Linux
: P3 normal
Target Milestone: UCS 3.3-0-errata
Assignee: Philipp Hahn
QA Contact: Arvid Requate
URL:
Keywords:
Depends on: 34268
Blocks:
  Show dependency treegraph
 
Reported: 2016-06-08 22:17 CEST by Arvid Requate
Modified: 2016-09-21 21:27 CEST (History)
2 users (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Customer ID:
Max CVSS v3 score:
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2016-06-08 22:17:02 CEST
The also needs to be fixed in UCS 3.3


+++ This bug was initially created as a clone of Bug #34268 +++

* The PRNG is not always correctly reseeding when a new process is forked (CVE-2014-0017).



Another issue has been fixed in upstream Debian package version 0.4.5-3+squeeze3:

* Weak Diffie-Hellman secret generation in libssh (CVE-2016-0739)
Comment 1 Philipp Hahn univentionstaff 2016-06-09 10:08:23 CEST
$ repo_admin.py --cherrypick -r 3.1 -s extsec3.1 --releasedest 3.3 --dest errata3.3-0 -p libssh

Package: libssh
Version: 0.4.5-3.19.201606091004
Branch: ucs_3.3-0
Scope: errata3.3-0

r70004 | Bug #34269: libssh YAML
r70005 | Bug #34269: libssh
 libssh.yaml
Comment 2 Arvid Requate univentionstaff 2016-06-09 17:55:44 CEST
* Source package version imported and built
* Binary package updatable
* Advisory Ok
Comment 3 Janek Walkenhorst univentionstaff 2016-06-15 12:09:14 CEST
<http://errata.software-univention.de/ucs/3.3/4.html>