First published: Tue Dec 20 2016(Updated: )
It was found that the shared memory manager used by pre-authentication compression support had a bounds checks that could be elided by some optimising compilers. Additionally, this memory manager was incorrectly accessible when pre-authentication compression was disabled. This could potentially allow attacks against the privileged monitor process from the sandboxed privilege-separation process (a compromise of the latter would be required first). CVE assignment: <a href="http://seclists.org/oss-sec/2016/q4/708">http://seclists.org/oss-sec/2016/q4/708</a> External References: <a href="https://www.openssh.com/txt/release-7.4">https://www.openssh.com/txt/release-7.4</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssh | <7.4 | 7.4 |
ubuntu/openssh | <1:6.6 | 1:6.6 |
ubuntu/openssh | <1:7.4 | 1:7.4 |
ubuntu/openssh | <1:7.2 | 1:7.2 |
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u2 1:9.2p1-2+deb12u3 1:9.8p1-2 | |
OpenSSH | <=7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10012 has a medium severity rating due to its potential to expose memory vulnerabilities.
To fix CVE-2016-10012, upgrade your OpenSSH package to at least version 7.4 for Red Hat and the specified versions for Ubuntu and Debian.
CVE-2016-10012 addresses a potential security flaw in the shared memory manager used by OpenSSH that could be exploited when pre-authentication compression is enabled.
CVE-2016-10012 affects OpenSSH versions prior to 7.4 for Red Hat and other corresponding versions for Ubuntu and Debian.
CVE-2016-10012 is not classified as critical but requires prompt attention due to its potential security implications.