LWN.net Logo

openssh: code execution

Package(s):openssh CVE #(s):CVE-2012-5536
Created:February 21, 2013 Updated:March 11, 2013
Description: From the Red Hat advisory:

Due to the way the pam_ssh_agent_auth PAM module was built in Red Hat Enterprise Linux 6, the glibc's error() function was called rather than the intended error() function in pam_ssh_agent_auth to report errors. As these two functions expect different arguments, it was possible for an attacker to cause an application using pam_ssh_agent_auth to crash, disclose portions of its memory or, potentially, execute arbitrary code.

Alerts:
Red Hat RHSA-2013:0519-02 2013-02-21
Oracle ELSA-2013-0519 2013-02-25
Scientific Linux SL-open-20130228 2013-02-28
CentOS CESA-2013:0519 2013-03-09

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds