CVE-2016-10011 openssh: Leak of host private key material to privilege-separated child process via realloc

CVE ID

CVE-2016-10011

DESCRIPTION

It was found that the host private key material could possibly leak to the privilege-separated child processes via re-allocated memory. An attacker able to compromise the privilege-separated process could therefore obtain the leaked key information.

It seems that this flaw is not practically exploitable, the leak of host private key material to the privilege-separated child processes is theoretical. No such leak was observed in practice for normal-sized keys, nor does a leak to the child processes directly expose key material to unprivileged users. Because of the this restriction for successful exploitation, this issue has been rated as having Low security impact. A future update may address this flaw.


 

RESOLUTION

CentOS6    openssh    - Will not fix
CentOS7    openssh    - Use openssh-7.4p1-11.el7.x86_64.rpm

 

LINK TO ADVISORIES

  • https://nvd.nist.gov/vuln/detail/CVE-2016-10011
  • https://access.redhat.com/security/cve/cve-2016-10011
  • https://access.redhat.com/errata/RHSA-2017:2029

Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section