Bug 2235542 (CVE-2020-22218)

Summary: CVE-2020-22218 libssh2: use-of-uninitialized-value in _libssh2_transport_read
Product: [Other] Security Response Reporter: Anten Skrabec <askrabec>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bdettelb, caswilli, fjansen, jburrell, kaycoth, kdudka
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libssh2 1.10.0, libssh2 1.11.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the libssh2 library. An out-of-bounds access issue can occur due to an improper initialization of a variable, resulting in a crash in the application linked to the library.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2235808, 2236038, 2236039, 2236040    
Bug Blocks: 2235543    

Description Anten Skrabec 2023-08-29 01:00:25 UTC
An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.

Reference:
https://github.com/libssh2/libssh2/issues/477

Upstream patch:
https://github.com/libssh2/libssh2/commit/642eec48ff3adfdb7a9e562b6d7fc865d1733f45

Comment 2 TEJ RATHI 2023-08-30 08:00:23 UTC
Created libssh2 tracking bugs for this issue:

Affects: epel-all [bug 2236038]
Affects: fedora-all [bug 2236040]


Created mingw-libssh2 tracking bugs for this issue:

Affects: fedora-all [bug 2236039]

Comment 4 errata-xmlrpc 2023-10-10 16:13:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:5615 https://access.redhat.com/errata/RHSA-2023:5615