CVE-2014-0017
Publication date 5 March 2014
Last updated 24 July 2024
Ubuntu priority
The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
Status
Package | Ubuntu Release | Status |
---|---|---|
libssh | ||
References
Related Ubuntu Security Notices (USN)
- USN-2145-1
- libssh vulnerability
- 12 March 2014