-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:053 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : libssh Date : March 13, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated libssh package fixes security vulnerability: When using libssh before 0.6.3, a libssh-based server, when accepting a new connection, forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not guaranteed to be unique. The most important consequence is that servers using EC (ECDSA) or DSA certificates may under certain conditions leak their private key (CVE-2014-0017). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017 http://advisories.mageia.org/MGASA-2014-0119.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: eb6bcbc277a01a3bcc53d43b127becbe mbs1/x86_64/lib64ssh4-0.5.2-2.2.mbs1.x86_64.rpm 417ce1525889e70932b44399293791b0 mbs1/x86_64/lib64ssh-devel-0.5.2-2.2.mbs1.x86_64.rpm d4bbda02ed47d9b0df5f9e7992a29d6e mbs1/SRPMS/libssh-0.5.2-2.2.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFTIV92mqjQ0CJFipgRAn1pAKCI59sSMco0u5/Ff4pa3ut5fvAF/wCgptxb 9kuUknjWGT8mtgJ/+ZmIYwM= =cv+v -----END PGP SIGNATURE-----