Your submission was sent successfully! Close

CVE-2014-0017

Published: 5 March 2014

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

Priority

Medium

Status

Package Release Status
libssh
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (0.5.2-1ubuntu0.12.04.3)
quantal
Released (0.5.2-1ubuntu0.12.10.3)
saucy
Released (0.5.4-1ubuntu0.1)
upstream
Released (0.6.3)
Patches:
upstream: http://git.libssh.org/projects/libssh.git/commit/?id=e99246246b4061f7e71463f8806b9dcad65affa0