openssh is vulnerable to privilege escalation. It was discovered that the OpenSSH sshd daemon fetched PAM environment settings before running the login program. In configurations with UseLogin=yes
and the pam_env
PAM module configured to read user environment settings, a local user could use this flaw to execute arbitrary code as root.
rhn.redhat.com/errata/RHSA-2016-2588.html
rhn.redhat.com/errata/RHSA-2017-0641.html
www.debian.org/security/2016/dsa-3550
www.securityfocus.com/bid/86187
www.securitytracker.com/id/1036487
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html
access.redhat.com/errata/RHSA-2017:0641
access.redhat.com/security/updates/classification/#moderate
anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
bugzilla.redhat.com/show_bug.cgi?id=1218424
bugzilla.redhat.com/show_bug.cgi?id=1327547
bugzilla.redhat.com/show_bug.cgi?id=1328012
bugzilla.redhat.com/show_bug.cgi?id=1341747
bugzilla.redhat.com/show_bug.cgi?id=1353359
bugzilla.redhat.com/show_bug.cgi?id=1353410
bugzilla.redhat.com/show_bug.cgi?id=1373836
bugzilla.redhat.com/show_bug.cgi?id=1397547
cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html
security-tracker.debian.org/tracker/CVE-2015-8325
security.gentoo.org/glsa/201612-18
security.netapp.com/advisory/ntap-20180628-0001/