The host is installed with OpenSSH before 5.8p2 and is prone to a exposure of sensitive information to an unauthorized actor vulnerability. A flaw is present in the application, which is due to ssh-keysign.c in ssh-keysign which on certain platforms executes ssh-rand-helper with unintended open file descriptors. Successful exploitation could allow remote attackers to obtain sensitive key informati ...