Re: CVE-2014-0160 CentOS 6 openssl heartbleed workaround

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 04/09/2014 07:40 AM, Stephen Harris wrote:
> On Wed, Apr 09, 2014 at 09:36:25AM -0400, James B. Byrne wrote:
>> However, if one was running an affected service, say httpd/ mod_ssl, on a host
>> that had sftp sessions connected to it then would not the ssh private keys of
>> the host and local users be in memory and therefore readable by the exploit? 
> [...]
>
>> state. As I understand the exploit it allows systematic transfer of every byte
>> in memory which would include the unprotected keys would it not?
> I'm pretty sure the exploit can only read the memory of the process and not
> of the kernel; "apache" shouldn't be able to read the memory space of a
> root process.  If it could then we'd have no key security at all, anyway!
> This isn't a privilege escalation attack...
>

According to heartbleed,org, private keys for httpd (or other TLS / SSL
services) are readable.  Though the 64KB bit of memory obtainable is
random, so its not like they can just ask for the private keys or query
a database for someone's password, etc.  They could only get a random
chunk of things active in memory when they make the request.  For what
its worth, CentOS.org is replacing our certificate private keys.  Others
can obviously make their own choices.

Thanks,
Johnny Hughes

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux