[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[linux-security] openssl RNG weaknesses



Topic
=====
predictability of random number sequences in openssl

Problem Description
===================
The pseudo-random number generator (PRNG) in SSLeay/OpenSSL versions
up to 0.9.6a is weakened by a design error.  Knowing the output of
specific PRNG requests (including a number of consecutive very short
PRNG requests) would allow an attacker to determine the PRNG's
internal state and thus to predict future PRNG output.

Affected Systems
================
Systems that use openssl versions < 0.9.6b

Solution
========
upgrade to openssl-0.9.6b (or patched version for your distribution)

RedHat 6.x
----------
rpm -Fvh openssl-0.9.5a-7.6.x.i386.rpm \
         openssl-devel-0.9.5a-7.6.x.i386.rpm \
         openssl-perl-0.9.5a-7.6.x.i386.rpm \
         openssl-python-0.9.5a-7.6.x.i386.rpm

RedHat 7.0
----------
rpm -Fvh openssl-0.9.6-9.i386.rpm \
         openssl-devel-0.9.6-9.i386.rpm \
         openssl-perl-0.9.6-9.i386.rpm \
         openssl-python-0.9.6-9.i386.rpm \
         openssl095a-0.9.5a-9.i386.rpm

RedHat 7.1
----------
rpm -Fvh openssl-0.9.6-9.i386.rpm \
         openssl-devel-0.9.6-9.i386.rpm \
         openssl-perl-0.9.6-9.i386.rpm \
         openssl-python-0.9.6-9.i386.rpm \
         openssl095a-0.9.5a-9.i386.rpm \
         nss_ldap-149-4.i386.rpm

Mandrake 7.1
------------
rpm -Fvh openssl-0.9.5a-3.1mdk.i586.rpm openssl-devel-0.9.5a-3.1mdk.i586.rpm

Mandrake 7.2
------------
rpm -Fvh openssl-0.9.5a-8.1mdk.i586.rpm openssl-devel-0.9.5a-8.1mdk.i586.rpm

Mandrake 8.0
------------
rpm -Fvh openssl-0.9.6-7.1mdk.i586.rpm openssl-devel-0.9.6-7.1mdk.i586.rpm