Use-after-free vulnerability in the mmanswerpamfreectx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITORREQPAMFREECTX request.
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1:6.6p1-2ubuntu2.2",
            "binary_name": "openssh-client"
        },
        {
            "binary_version": "1:6.6p1-2ubuntu2.2",
            "binary_name": "openssh-server"
        },
        {
            "binary_version": "1:6.6p1-2ubuntu2.2",
            "binary_name": "openssh-sftp-server"
        },
        {
            "binary_version": "1:6.6p1-2ubuntu2.2",
            "binary_name": "ssh"
        },
        {
            "binary_version": "1:6.6p1-2ubuntu2.2",
            "binary_name": "ssh-askpass-gnome"
        },
        {
            "binary_version": "1:6.6p1-2ubuntu2.2",
            "binary_name": "ssh-krb5"
        }
    ]
}