>Number:         163951
>Category:       bin
>Synopsis:       bundled openssl seems to miss fix for a CVE-2011-1945
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Mon Jan 09 09:40:15 UTC 2012
>Closed-Date:
>Last-Modified:
>Originator:     Volodymyr Kostyrko
>Release:        RELENG_9
>Organization:
>Environment:
FreeBSD green.tandem.local 9.0-STABLE FreeBSD 9.0-STABLE #0 r229848: Mon Jan  9 
10:58:48 EET 2012     
arcade@green.tandem.local:/usr/obj/usr/src/sys/MINIMAL_4BSD  amd64
>Description:
Recently I started to recheck usability of ssh keys and found that ECDSA keys 
are already available. I've tried to make one and it points me about key bit 
length. Reading about this on

http://en.wikipedia.org/wiki/Elliptic_Curve_DSA

I also noticed that a timing attack is possible against OpenSSL. Quick checking 
the code shows that we haven't integrated the fix yet as current revision of

http://svnweb.freebsd.org/base/stable/9/crypto/openssl/crypto/ecdsa/ecs_ossl.c?revision=225736&view=markup
http://svnweb.freebsd.org/base/head/crypto/openssl/crypto/ecdsa/ecs_ossl.c?revision=225736&view=markup

misses the fix from:

http://cvs.openssl.org/chngview?cn=20892

And after latest OpenSSH import by des:

http://svnweb.freebsd.org/base?view=revision&revision=221420

we are automatically creating (and using?) private ECDSA key:

http://svnweb.freebsd.org/base/stable/9/etc/rc.d/sshd?r1=221419&r2=221420&;
>How-To-Repeat:

>Fix:
Import fix from http://cvs.openssl.org/chngview?cn=20892

>Release-Note:
>Audit-Trail:
>Unformatted:
_______________________________________________
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"

Reply via email to