There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to sshgetfingerprinthash() function. In such cases the binto_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.
{
"binaries": [
{
"binary_name": "libssh-4",
"binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.7+esm4"
},
{
"binary_name": "libssh-gcrypt-4",
"binary_version": "0.8.0~20170825.94fa1e38-1ubuntu0.7+esm4"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}