CVE-2014-0017

Publication date 5 March 2014

Last updated 24 July 2024


Ubuntu priority

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

Status

Package Ubuntu Release Status
libssh 13.10 saucy
Fixed 0.5.4-1ubuntu0.1
12.10 quantal
Fixed 0.5.2-1ubuntu0.12.10.3
12.04 LTS precise
Fixed 0.5.2-1ubuntu0.12.04.3
10.04 LTS lucid Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libssh