Ask the Community
Groups
CVE-2016-10011 openssh: Leak of host private key material to privilege-separated child process via realloc - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2016-10011</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>It was found that the host private key material could possibly leak to the privilege-separated child processes via re-allocated memory. An attacker able to compromise the privilege-separated process could therefore obtain the leaked key information.<br><br>It seems that this flaw is not practically exploitable, the leak of host private key material to the privilege-separated child processes is theoretical. No such leak was observed in practice for normal-sized keys, nor does a leak to the child processes directly expose key material to unprivileged users. Because of the this restriction for successful exploitation, this issue has been rated as having Low security impact. A future update may address this flaw.<br><br><br> </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>CentOS6 openssh - Will not fix<br>CentOS7 openssh - Use openssh-7.4p1-11.el7.x86_64.rpm<br><br> </p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2016-10011%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2016-10011%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Ferrata%2FRHSA-2017%3A2029">https://nvd.nist.gov/vuln/detail/CVE-2016-10011 https://access.redhat.com/security/cve/cve-2016-10011 https://access.redhat.com/errata/RHSA-2017:2029</a></li> <li><a rel="nofollow" href="(if">(if</a></li> <li><a rel="nofollow" href="CentOS7)">CentOS7)</a></li> </ul> </article> </main>