Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 813672 (CVE-2016-20012) - net-misc/openssh: user enumeration if pubkey and user are known (CVE-2016-20012)
Summary: net-misc/openssh: user enumeration if pubkey and user are known (CVE-2016-20012)
Status: RESOLVED UPSTREAM
Alias: CVE-2016-20012
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL: https://github.com/openssh/openssh-po...
Whiteboard: A4 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2021-09-18 17:39 UTC by John Helmert III
Modified: 2022-08-17 16:27 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-09-18 17:39:32 UTC
CVE-2016-20012:

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session.

Potential patch: https://github.com/openssh/openssh-portable/pull/270
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-17 16:27:54 UTC
Upstream says this won't be fixed in the near future.