Total vulnerabilities in the database
The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
Software | From | Fixed in |
---|---|---|
libssh / libssh | 0.6.1 | 0.6.1.x |
libssh / libssh | 0.5.1 | 0.5.1.x |
libssh / libssh | 0.5.0-rc1 | 0.5.0-rc1.x |
libssh / libssh | 0.6.0 | 0.6.0.x |
libssh / libssh | - | 0.6.2.x |
libssh / libssh | 0.5.3 | 0.5.3.x |
libssh / libssh | 0.4.7 | 0.4.7.x |
libssh / libssh | 0.5.2 | 0.5.2.x |
libssh / libssh | 0.5.0 | 0.5.0.x |
libssh / libssh | 0.5.5 | 0.5.5.x |
libssh / libssh | 0.5.4 | 0.5.4.x |
libssh / libssh | 0.4.8 | 0.4.8.x |