CVE-2014-0017

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2014-0017 at MITRE

Description

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

NVD CVSS v2 Base Score: 1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)

SUSE information

SUSE Bugzilla entries: 866278, 866286

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP3
  • libssh2 >= 0.2-5.20.1
Builds
SAT Patch Nr: 8982
openSUSE 12.3
  • libssh >= 0.5.3-2.8.1
  • libssh-debugsource >= 0.5.3-2.8.1
  • libssh-devel >= 0.5.3-2.8.1
  • libssh-devel-doc >= 0.5.3-2.8.1
  • libssh4 >= 0.5.3-2.8.1
  • libssh4-debuginfo >= 0.5.3-2.8.1
Patchnames:
openSUSE-2014-208
openSUSE 13.1
  • libssh >= 0.5.5-2.8.1
  • libssh-debugsource >= 0.5.5-2.8.1
  • libssh-devel >= 0.5.5-2.8.1
  • libssh-devel-doc >= 0.5.5-2.8.1
  • libssh4 >= 0.5.5-2.8.1
  • libssh4-32bit >= 0.5.5-2.8.1
  • libssh4-debuginfo >= 0.5.5-2.8.1
  • libssh4-debuginfo-32bit >= 0.5.5-2.8.1
Patchnames:
openSUSE-2014-208
openSUSE Evergreen 11.4
  • libssh >= 0.4.8-14.1
  • libssh-debugsource >= 0.4.8-14.1
  • libssh-devel >= 0.4.8-14.1
  • libssh-devel-doc >= 0.4.8-14.1
  • libssh4 >= 0.4.8-14.1
  • libssh4-debuginfo >= 0.4.8-14.1
Patchnames:
2014-29