A flaw was found in libSSH which can enable a client to bypass the authentication process and set the internal state machine maintained by the library to authenticated, enabling the (otherwise prohibited) creation of channels.
Acknowledgments: Name: the libssh team Upstream: Peter Winter-Smith (NCC Group)
Created libssh tracking bugs for this issue: Affects: fedora-all [bug 1639925]
Upstream issue: https://bugs.libssh.org/T101
External References: https://www.libssh.org/security/advisories/CVE-2018-10933.txt
Statement: This vulnerability affects libssh shipped in Red Hat Enterprise Linux 7 Extras. No libssh packages are included in Red Hat Enterprise Linux 6 and earlier. This issue does not affect libssh2 or openssh. This issue can only be affect applications that use libssh to implement an SSH server; SSH client functionality is not affected. No packages in Red Hat products use libssh to implement an SSH server. Therefore, no package from Red Hat that uses the libssh library is affected by this flaw. The libssh library is available for customer or third party code to use. Such code that is linked against libssh and uses the `ssh_bind*` functions may be affected by this flaw.