Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/crypto/external/bsd/openssh/dist Fix CVE-2011-0539:



details:   https://anonhg.NetBSD.org/src/rev/00f7e4232103
branches:  trunk
changeset: 761674:00f7e4232103
user:      christos <christos%NetBSD.org@localhost>
date:      Fri Feb 04 22:11:09 2011 +0000

description:
Fix CVE-2011-0539:
Legacy certificates generated by OpenSSH might contain data
from the stack thus leaking confidential information.

diffstat:

 crypto/external/bsd/openssh/dist/key.c |  8 +++-----
 1 files changed, 3 insertions(+), 5 deletions(-)

diffs (30 lines):

diff -r 2b2806ed3844 -r 00f7e4232103 crypto/external/bsd/openssh/dist/key.c
--- a/crypto/external/bsd/openssh/dist/key.c    Fri Feb 04 22:09:17 2011 +0000
+++ b/crypto/external/bsd/openssh/dist/key.c    Fri Feb 04 22:11:09 2011 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: key.c,v 1.4 2010/11/21 18:59:04 adam Exp $     */
+/*     $NetBSD: key.c,v 1.5 2011/02/04 22:11:09 christos Exp $ */
 /* $OpenBSD: key.c,v 1.90 2010/07/13 23:13:16 djm Exp $ */
 /*
  * read_bignum():
@@ -36,7 +36,7 @@
  */
 
 #include "includes.h"
-__RCSID("$NetBSD: key.c,v 1.4 2010/11/21 18:59:04 adam Exp $");
+__RCSID("$NetBSD: key.c,v 1.5 2011/02/04 22:11:09 christos Exp $");
 #include <sys/param.h>
 #include <sys/types.h>
 
@@ -1514,10 +1514,8 @@
        buffer_put_cstring(&k->cert->certblob, key_ssh_name(k));
 
        /* -v01 certs put nonce first */
+       arc4random_buf(&nonce, sizeof(nonce));
        if (k->type == KEY_DSA_CERT || k->type == KEY_RSA_CERT) {
-               /*arc4random_buf(&nonce, sizeof(nonce));*/
-               for (i = 0; i < sizeof(nonce); i += 4)
-                       *(uint32_t *)&(nonce[i]) = arc4random();
                buffer_put_string(&k->cert->certblob, nonce, sizeof(nonce));
        }
 



Home | Main Index | Thread Index | Old Index