CVE-2014-0017

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2014-0017 at MITRE

Description

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
CVSS v2 Scores
  National Vulnerability Database
Base Score 1.85
Vector AV:L/AC:M/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

SUSE information

SUSE Bugzilla entries: 866278 [CLOSED / FIXED], 866286 [RESOLVED / INVALID]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 11 SP3
  • libssh2 >= 0.2-5.20.1
Patchnames:
sledsp3-libssh2
SUSE Linux Enterprise Software Development Kit 11 SP3
  • libssh2 >= 0.2-5.20.1
Patchnames:
sdksp3-libssh2
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP3
  • libssh2 >= 0.2-5.20.1
Builds
SAT Patch Nr: 8982
openSUSE 12.3
  • libssh >= 0.5.3-2.8.1
  • libssh-debugsource >= 0.5.3-2.8.1
  • libssh-devel >= 0.5.3-2.8.1
  • libssh-devel-doc >= 0.5.3-2.8.1
  • libssh4 >= 0.5.3-2.8.1
  • libssh4-debuginfo >= 0.5.3-2.8.1
Patchnames:
openSUSE-2014-208
openSUSE 13.1
  • libssh >= 0.5.5-2.8.1
  • libssh-debugsource >= 0.5.5-2.8.1
  • libssh-devel >= 0.5.5-2.8.1
  • libssh-devel-doc >= 0.5.5-2.8.1
  • libssh4 >= 0.5.5-2.8.1
  • libssh4-32bit >= 0.5.5-2.8.1
  • libssh4-debuginfo >= 0.5.5-2.8.1
  • libssh4-debuginfo-32bit >= 0.5.5-2.8.1
Patchnames:
openSUSE-2014-208
openSUSE Evergreen 11.4
  • libssh >= 0.4.8-14.1
  • libssh-debugsource >= 0.4.8-14.1
  • libssh-devel >= 0.4.8-14.1
  • libssh-devel-doc >= 0.4.8-14.1
  • libssh4 >= 0.4.8-14.1
  • libssh4-debuginfo >= 0.4.8-14.1
Patchnames:
2014-29