The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-2145-1 | vendor advisory |
http://www.debian.org/security/2014/dsa-2879 | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00036.html | vendor advisory |
http://secunia.com/advisories/57407 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2014/03/05/1 | mailing list |
http://www.libssh.org/2014/03/04/libssh-0-6-3-security-release/ | patch vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00040.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1072191 |