Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 498760 (CVE-2013-7295) - <net-misc/tor-0.2.4.20: improper random number generation on certain Intel platforms with OpenSSL 1. (CVE-2013-7295)
Summary: <net-misc/tor-0.2.4.20: improper random number generation on certain Intel pl...
Status: RESOLVED FIXED
Alias: CVE-2013-7295
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-01-21 09:40 UTC by Agostino Sarubbo
Modified: 2014-02-02 18:33 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-01-21 09:40:39 UTC
From ${URL} :

Common Vulnerabilities and Exposures assigned an identifier CVE-2013-7295 to
the following vulnerability:

Name: CVE-2013-7295
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7295
Assigned: 20140117
Reference: https://lists.torproject.org/pipermail/tor-talk/2013-December/031483.html

Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a
certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge
platforms, does not properly generate random numbers for (1) relay
identity keys and (2) hidden-service identity keys, which might make
it easier for remote attackers to bypass cryptographic protection
mechanisms via unspecified vectors.


@maintainer(s): since the fixed package is already in the tree, please let us know if it is ready for the stabilization or not.
Comment 1 Anthony Basile gentoo-dev 2014-01-21 15:45:46 UTC
(In reply to Agostino Sarubbo from comment #0)
> 
> 
> @maintainer(s): since the fixed package is already in the tree, please let
> us know if it is ready for the stabilization or not.

It is ready:

KEYWORDS="amd64 arm ppc ppc64 sparc x86"
Comment 2 Agostino Sarubbo gentoo-dev 2014-01-22 18:27:24 UTC
amd64 stable
Comment 3 Agostino Sarubbo gentoo-dev 2014-01-22 18:27:44 UTC
x86 stable
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2014-01-26 02:16:38 UTC
CVE-2013-7295 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7295):
  Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain
  HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does
  not properly generate random numbers for (1) relay identity keys and (2)
  hidden-service identity keys, which might make it easier for remote
  attackers to bypass cryptographic protection mechanisms via unspecified
  vectors.
Comment 5 Agostino Sarubbo gentoo-dev 2014-01-26 11:47:03 UTC
arm stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-01-26 11:57:24 UTC
ppc64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2014-01-26 12:00:23 UTC
sparc stable
Comment 8 Agostino Sarubbo gentoo-dev 2014-02-02 10:59:55 UTC
ppc stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 9 Anthony Basile gentoo-dev 2014-02-02 12:17:25 UTC
(In reply to Agostino Sarubbo from comment #8)
> ppc stable.
> 
> Maintainer(s), please cleanup.
> Security, please vote.

Done.
Comment 10 Sergey Popov gentoo-dev 2014-02-02 18:24:56 UTC
Thanks for your work

GLSA vote: no
Comment 11 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-02-02 18:33:44 UTC
GLSA vote: no.

Closing as [noglsa]