First published: Tue Oct 30 2012(Updated: )
Florian Weimer of the Red Hat Product Security Team reported several instances of code in libssh where a heap region is deallocated twice, first in the main path and then on the error path. This could crash the process using libssh, or possible allow for the execution of arbitrary code. The identified affected variables are: agent.c:agent_sign_data(): request channels.c:channel_request(): req auth.c:ssh_userauth_pubkey(): user, service, method, algo, pkstr sftp.c:sftp_parse_attr_3(): longname, name sftp.c:sftp_mkdir(): buffer, path keyfiles.c:try_publickey_from_file(): pubkey sftp.c:sftp_mkdir() has been corrected via the following git commit: <a href="http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=4d8420f3282ed07fc99fc5e930c17df27ef1e9b2">http://git.libssh.org/projects/libssh.git/commit/?h=v0-5&id=4d8420f3282ed07fc99fc5e930c17df27ef1e9b2</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libssh Libssh | <=0.5.2 | |
Libssh Libssh | =0.4.7 | |
Libssh Libssh | =0.4.8 | |
Libssh Libssh | =0.5.0 | |
Libssh Libssh | =0.5.0-rc1 | |
Libssh Libssh | =0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.