CVE-2011-0766
Published: 31 May 2011
The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
Notes
Author | Note |
---|---|
jdstrand | Debian squeeze has fix in 1:14.a-dfsg-3squeeze1 |
mdeslaur | erlang-ssh in in universe in lucid and natty. Patch only adds new functions to crypto library, doesn't change existing ones, so downgrading priority. Backport is difficult due to appup changes. |
Priority
Status
Package | Release | Status |
---|---|---|
erlang Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(1:14.b.4-dfsg-1ubuntu1)
|
|
quantal |
Not vulnerable
(1:15.b.1-dfsg-3ubuntu2)
|
|
raring |
Not vulnerable
(1:15.b.1-dfsg-3ubuntu2)
|
|
upstream |
Released
(1:14.b.3-dfsg-2, 1:15.b.1-dfsg-3)
|
|
Patches: other: https://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5 |