First published: Tue Dec 20 2016(Updated: )
It was found that the shared memory manager used by pre-authentication compression support had a bounds checks that could be elided by some optimising compilers. Additionally, this memory manager was incorrectly accessible when pre-authentication compression was disabled. This could potentially allow attacks against the privileged monitor process from the sandboxed privilege-separation process (a compromise of the latter would be required first). CVE assignment: <a href="http://seclists.org/oss-sec/2016/q4/708">http://seclists.org/oss-sec/2016/q4/708</a> External References: <a href="https://www.openssh.com/txt/release-7.4">https://www.openssh.com/txt/release-7.4</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | <=7.3 | |
redhat/openssh | <7.4 | 7.4 |
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u2 1:9.2p1-2+deb12u3 1:9.8p1-2 | |
ubuntu/openssh | <1:6.6 | 1:6.6 |
ubuntu/openssh | <1:7.4 | 1:7.4 |
ubuntu/openssh | <1:7.2 | 1:7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.