UbuntuUpdates.org

Package "ssh-askpass-gnome"

Name: ssh-askpass-gnome

Description:

interactive X program to prompt users for a passphrase for ssh-add

Latest version: 1:8.2p1-4ubuntu0.11
Release: focal (20.04)
Level: security
Repository: universe
Head package: openssh
Homepage: http://www.openssh.com/

Links


Download "ssh-askpass-gnome"


Other versions of "ssh-askpass-gnome" in Focal

Repository Area Version
base universe 1:8.2p1-4
updates universe 1:8.2p1-4ubuntu0.11

Changelog

Version: 1:8.2p1-4ubuntu0.11 2024-01-03 20:07:54 UTC

  openssh (1:8.2p1-4ubuntu0.11) focal-security; urgency=medium

  * SECURITY UPDATE: Supplemental groups not initialized
    - debian/patches/CVE-2021-41617-1.patch: add initgroups()
      before setresgid() in auth.c.
    - debian/patches/CVE-2021-41617-2.patch: add grp.h in auth.c.
    - CVE-2021-41617
  * SECURITY UPDATE: command injection via shell metacharacters
    - debian/patches/CVE-2023-51385.patch: ban user/hostnames with most
      shell metacharacters in ssh.c.
    - CVE-2023-51385

 -- Marc Deslauriers <email address hidden> Tue, 02 Jan 2024 12:13:02 -0500

Source diff to previous version
CVE-2021-41617 sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by a

Version: 1:8.2p1-4ubuntu0.10 2023-12-19 16:08:32 UTC

  openssh (1:8.2p1-4ubuntu0.10) focal-security; urgency=medium

  * SECURITY UPDATE: Prefix truncation attack on BPP
    - debian/patches/CVE-2023-48795.patch: implement "strict key exchange"
      in PROTOCOL, kex.c, kex.h, packet.c, sshconnect2.c, sshd.c.
    - CVE-2023-48795

 -- Marc Deslauriers <email address hidden> Mon, 18 Dec 2023 11:35:39 -0500

Source diff to previous version
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integri

Version: 1:8.2p1-4ubuntu0.9 2023-08-09 08:07:00 UTC

  openssh (1:8.2p1-4ubuntu0.9) focal-security; urgency=medium

  * SECURITY UPDATE: information leak in algorithm negotiation (LP: #2030275)
    - debian/patches/CVE-2020-14145-mitigation.patch: tweak the client
      hostkey preference ordering algorithm in sshconnect2.c.
    - Note: This update does not solve CVE-2020-14145, but does mitigate
      the issue in the specific scenario where the user has a key that
      matches the best-preference default algorithm.

 -- Marc Deslauriers <email address hidden> Fri, 04 Aug 2023 18:02:08 -0400

Source diff to previous version
2030275 Include mitigation for CVE-2020-14145
CVE-2020-14145 The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man

Version: 1:8.2p1-4ubuntu0.8 2023-07-24 19:07:09 UTC

  openssh (1:8.2p1-4ubuntu0.8) focal-security; urgency=medium

  * SECURITY UPDATE: remote code execution relating to PKCS#11 providers
    - debian/patches/CVE-2023-38408-1.patch: terminate process if requested
      to load a PKCS#11 provider that isn't a PKCS#11 provider in
      ssh-pkcs11.c.
    - debian/patches/CVE-2023-38408-3.patch: ensure FIDO/PKCS11 libraries
      contain expected symbols in misc.c, misc.h, ssh-pkcs11.c, ssh-sk.c.
    - CVE-2023-38408

 -- Marc Deslauriers <email address hidden> Wed, 19 Jul 2023 15:56:59 -0400

Source diff to previous version
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent

Version: 1:8.2p1-4ubuntu0.2 2021-03-10 16:06:22 UTC

  openssh (1:8.2p1-4ubuntu0.2) focal-security; urgency=medium

  * SECURITY UPDATE: double-free memory corruption in ssh-agent
    - debian/patches/CVE-2021-28041.patch: set ext_name to NULL after
      freeing it so it doesn't get freed again later on in ssh-agent.c.
    - CVE-2021-28041

 -- Marc Deslauriers <email address hidden> Tue, 09 Mar 2021 09:17:50 -0500

CVE-2021-28041 ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a



About   -   Send Feedback to @ubuntu_updates