UbuntuUpdates.org

Package "openssh"

Name: openssh

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • secure shell (SSH) client, for secure access to remote machines
  • secure shell (SSH) server, for secure access from remote machines
  • secure shell (SSH) sftp server module, for SFTP access from remote machines
  • secure shell client and server (metapackage)

Latest version: 1:7.7p1-4ubuntu0.3
Release: cosmic (18.10)
Level: updates
Repository: main

Links

Save this URL for the latest version of "openssh": https://www.ubuntuupdates.org/openssh



Other versions of "openssh" in Cosmic

Repository Area Version
base main 1:7.7p1-4
base universe 1:7.7p1-4
security main 1:7.7p1-4ubuntu0.3
security universe 1:7.7p1-4ubuntu0.3
updates universe 1:7.7p1-4ubuntu0.3

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1:7.7p1-4ubuntu0.3 2019-03-04 21:07:12 UTC

  openssh (1:7.7p1-4ubuntu0.3) cosmic-security; urgency=medium

  * SECURITY UPDATE: Incomplete fix for CVE-2019-6111
    - debian/patches/CVE-2019-6111-2.patch: add another fix to the filename
      check in scp.c.
    - CVE-2019-6111
  * Fixed inverted CVE numbers in patch filenames and in previous
    changelog.

 -- Marc Deslauriers <email address hidden> Mon, 04 Mar 2019 07:38:06 -0500

Source diff to previous version
CVE-2019-6111 An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sen

Version: 1:7.7p1-4ubuntu0.2 2019-02-07 22:07:29 UTC

  openssh (1:7.7p1-4ubuntu0.2) cosmic-security; urgency=medium

  * SECURITY UPDATE: access restrictions bypass in scp
    - debian/patches/CVE-2018-20685.patch: disallow empty filenames
      or ones that refer to the current directory in scp.c.
    - CVE-2018-20685
  * SECURITY UPDATE: scp client spoofing via object name
    - debian/patches/CVE-2019-6109.patch: make sure the filenames match
      the wildcard specified by the user, and add new flag to relax the new
      restrictions in scp.c, scp.1.
    - CVE-2019-6109
  * SECURITY UPDATE: scp client missing received object name validation
    - debian/patches/CVE-2019-6111-1.patch: sanitize scp filenames via
      snmprintf in atomicio.c, progressmeter.c, progressmeter.h,
      scp.c, sftp-client.c.
    - debian/patches/CVE-2019-6111-2.patch: force progressmeter updates in
      progressmeter.c, progressmeter.h, scp.c, sftp-client.c.
    - CVE-2019-6111

 -- Marc Deslauriers <email address hidden> Thu, 31 Jan 2019 08:35:48 -0500

Source diff to previous version
CVE-2018-20685 In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename.
CVE-2019-6109 An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker)
CVE-2019-6111 An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sen

Version: 1:7.7p1-4ubuntu0.1 2018-12-03 17:06:59 UTC

  openssh (1:7.7p1-4ubuntu0.1) cosmic; urgency=medium

  * debian/patches/fix-broken-tunnel-forwarding.patch: Fix tunnel forwarding
    broken in 7.7p1. Thanks to Damien Miller <email address hidden>. (LP: #1801128)

 -- Karl Stenerud <email address hidden> Wed, 07 Nov 2018 14:52:49 +0100

1801128 OpenSSH 7.7 -w tunnel bug



About   -   Send Feedback to @ubuntu_updates