First published: Tue Oct 30 2012(Updated: )
Florian Weimer of the Red Hat Product Security Team reported the existence of several unitialized heap allocations in the following functions: keys.c:publickey_make_dss() (key) keys.c:publickey_make_rsa() (key) keys.c:signature_from_string() (sign) keys.c:ssh_do_sign() (sign) keys.c:ssh_sign_session_id() (sign) This could lead to freeing an invalid pointer on an error path, which could lead to a crash in the process using libssh.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libssh Libssh | <=0.5.2 | |
Libssh Libssh | =0.4.7 | |
Libssh Libssh | =0.4.8 | |
Libssh Libssh | =0.5.0 | |
Libssh Libssh | =0.5.0-rc1 | |
Libssh Libssh | =0.5.1 | |
redhat/libssh | <0.5.3 | 0.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.