Bug 390371 - (CVE-2007-5502) CVE-2007-5502 openssl FIPS module PRNG flaw
CVE-2007-5502 openssl FIPS module PRNG flaw
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
source=upstream,reported=20071117,pub...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2007-11-19 08:58 EST by Tomas Hoger
Modified: 2007-11-30 05:29 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-11-30 05:13:52 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2007-11-19 08:58:07 EST
From OpenSSL advisory:

A significant flaw in the PRNG implementation for the OpenSSL FIPS Object 
Module v1.1.1 (certificate #733, 
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#733) 
has been reported by Geoff Lowe of Secure Computing corporation. Due to a 
coding error in the FIPS self-test the auto-seeding never takes place. 
That means that the PRNG key and seed used correspond to the last 
self-test. The FIPS PRNG gets additional seed data only from date-time 
information, so the generated random data is far more predictable than it 
should be, especially for the first few calls (CVE-2007-5502).

Note that this PRNG bug is only present in the v1.1.1 implementation and 
not in the regular OpenSSL product or in the OpenSSL FIPS Object Module 
v1.2 now undergoing validation testing. Only those applications using 
v1.1.1 of the OpenSSL FIPS Object Module which enter FIPS mode are 
affected. Applications which do not enter FIPS mode or which use any other 
version of OpenSSL are not affected.

Bugs like this in open source software are routinely found and corrected 
with a patch and/or updated source distribution. In this case two 
different such fixes have been developed by Dr Stephen Henson 
<steve-at-openssl.org>: http://www.openssl.org/news/patch-CVE-2007-5502-1.txt 
(the simplest direct fix) and: 
http://www.openssl.org/news/patch-CVE-2007-5502-2.txt (a workaround which 
avoids touching the PRNG code directly). However, for FIPS 140-2 validated 
software no changes are permitted without prior CMVP approval.

In consultation with the CMT test lab we will be submitting a "letter 
change" update request to the CMVP for the latter of these two patches. 
This latter patch also addresses a minor issue with the continuous PRNG 
self test. Once (and if) approved the new distribution containing this 
patch will be posted to replace the current distribution at 
http://openssl.org/source/openssl-fips-1.1.1.tar.gz.
Comment 1 Tomas Mraz 2007-11-19 09:24:19 EST
If it really affects only FIPS certified versions of OpenSSL then we are not
vulnerable at all. We do not ship certified version of OpenSSL.
Comment 3 Mark J. Cox (Product Security) 2007-11-30 05:13:09 EST
now public, removing embargo
http://www.openssl.org/news/secadv_20071129.txt

Note You need to log in before you can comment on or make changes to this bug.