The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
2014-03-14T15:55:05.603
2025-04-12T10:46:40.837
Deferred
CVSSv2: 1.9 (LOW)
AV:L/AC:M/Au:N/C:P/I:N/A:N
3.4
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | libssh | libssh | ≤ 0.6.2 | Yes |
Application | libssh | libssh | 0.4.7 | Yes |
Application | libssh | libssh | 0.4.8 | Yes |
Application | libssh | libssh | 0.5.0 | Yes |
Application | libssh | libssh | 0.5.0 | Yes |
Application | libssh | libssh | 0.5.1 | Yes |
Application | libssh | libssh | 0.5.2 | Yes |
Application | libssh | libssh | 0.5.3 | Yes |
Application | libssh | libssh | 0.5.4 | Yes |
Application | libssh | libssh | 0.5.5 | Yes |
Application | libssh | libssh | 0.6.0 | Yes |
Application | libssh | libssh | 0.6.1 | Yes |