The authentication check of the connecting client can be bypassed in the function `pki_verify_data_signature` in circumstances of memory allocation problems. This may happen f.e. if not enough memory or the memory usage is limited. The problem is caused by the return value `rc`, which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible`. The value of the variable is not changed between this point and the cryptographic verification, therefore any error between them calls `goto error` returning SSH_OK.
Created libssh tracking bugs for this issue: Affects: epel-7 [bug 2196100] Affects: fedora-all [bug 2196102] Created libssh2 tracking bugs for this issue: Affects: epel-8 [bug 2196101] Affects: fedora-all [bug 2196103] Created mingw-libssh2 tracking bugs for this issue: Affects: fedora-all [bug 2196104]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:3839 https://access.redhat.com/errata/RHSA-2023:3839
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-2283
This comment was flagged a spam, view the edit history to see the original text if required.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:6643 https://access.redhat.com/errata/RHSA-2023:6643
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0538 https://access.redhat.com/errata/RHSA-2024:0538