CVE-2014-0017
Publication date 5 March 2014
Last updated 24 July 2024
Ubuntu priority
The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
Status
Package | Ubuntu Release | Status |
---|---|---|
libssh | 13.10 saucy |
Fixed 0.5.4-1ubuntu0.1
|
12.10 quantal |
Fixed 0.5.2-1ubuntu0.12.10.3
|
|
12.04 LTS precise |
Fixed 0.5.2-1ubuntu0.12.04.3
|
|
10.04 LTS lucid | Ignored end of life |
References
Related Ubuntu Security Notices (USN)
- USN-2145-1
- libssh vulnerability
- 12 March 2014