An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
| Software | From | Fixed in |
|---|---|---|
| libssh2 / libssh2 | - | 1.8.1 |
| fedoraproject / fedora | 29 | 29.x |
| debian / debian_linux | 8.0 | 8.0.x |
| opensuse / leap | 42.3 | 42.3.x |