The sshpacketread_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "6.8"
},
{
"introduced": "0"
},
{
"last_affected": "6.8-p1"
},
{
"introduced": "0"
},
{
"last_affected": "6.9"
},
{
"introduced": "0"
},
{
"last_affected": "6.9-p1"
},
{
"introduced": "0"
},
{
"last_affected": "7.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.0-p1"
},
{
"introduced": "0"
},
{
"last_affected": "7.1-p1"
}
]
}