people.canonical.com Open in urlscan Pro
91.189.89.62  Public Scan

URL: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-10012
Submission: On March 17 via api from IL — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

Ubuntu CVE Tracker
 * Home
 * Main
 * Universe
 * Partner


CVE-2016-10012

Priority
Low

Description
The shared memory manager (associated with pre-authentication compression)
in sshd in OpenSSH before 7.4 does not ensure that a bounds check is
enforced by all compilers, which might allows local users to gain
privileges by leveraging access to a sandboxed privilege-separation
process, related to the m_zback and m_zlib data structures.

References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012
https://www.openssh.com/txt/release-7.4
http://www.openwall.com/lists/oss-security/2016/12/19/2
https://ubuntu.com/security/notices/USN-3538-1

Bugs
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848717

Assigned-to
mdeslaur

Notes

ratliffMitigating circumstances noted in the release notes:
This could potentially allow attacks against the
privileged monitor process from the sandboxed privilege-separation
process (a compromise of the latter would be required first).
also "pre-auth compression has been disabled by default in
sshd for >10 years."

Package
Source: openssh (LP Ubuntu Debian)

Upstream:released (1:7.4p1-1) Ubuntu 18.04 LTS (Bionic Beaver):not-affected
(1:7.4p1-1) Ubuntu 20.04 LTS (Focal Fossa):not-affected (1:7.4p1-1) Ubuntu 16.04
ESM (Xenial Xerus):released (1:7.2p2-4ubuntu2.4) Ubuntu 14.04 ESM (Trusty
Tahr):released (1:6.6p1-2ubuntu2.10)

Patches:

Upstream:https://github.com/openssh/openssh-portable/commit/0082fba4efdd492f765ed4c53f0d0fbd3bdbdf7f
Upstream:https://github.com/openssh/openssh-portable/commit/4577adead6a7d600c8e764619d99477a08192c8f
Upstream:https://github.com/openssh/openssh-portable/commit/b7689155f3f5c4999846c07a852b1c7a43b09cec

More Information
 * Mitre
 * NVD
 * Launchpad
 * Debian

Updated: 2022-02-11 01:07:17 UTC (commit
acb3d89ab51f1d5e5543fa993969c0eb13c71f04)

© Canonical Ltd. 2007-2022