UbuntuUpdates.org

Package "ssh"

Name: ssh

Description:

secure shell client and server (metapackage)

Latest version: 1:8.9p1-3ubuntu0.13
Release: jammy (22.04)
Level: updates
Repository: main
Head package: openssh
Homepage: http://www.openssh.com/

Links


Download "ssh"


Other versions of "ssh" in Jammy

Repository Area Version
base main 1:8.9p1-3
security main 1:8.9p1-3ubuntu0.13

Changelog

Version: 1:8.9p1-3ubuntu0.13 2025-04-24 17:07:30 UTC

  openssh (1:8.9p1-3ubuntu0.13) jammy-security; urgency=medium

  * SECURITY UPDATE: incorrect DisableForwarding directive behaviour
    - debian/patches/CVE-2025-32728.patch: fix logic error in session.c.
    - CVE-2025-32728

 -- Marc Deslauriers <email address hidden> Fri, 11 Apr 2025 08:05:47 -0400

Source diff to previous version
CVE-2025-32728 In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwardin

Version: 1:8.9p1-3ubuntu0.11 2025-02-18 22:07:17 UTC

  openssh (1:8.9p1-3ubuntu0.11) jammy-security; urgency=medium

  * SECURITY UPDATE: MitM with VerifyHostKeyDNS option
    - debian/patches/CVE-2025-26465.patch: fix error code handling in
      krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c.
    - CVE-2025-26465

 -- Marc Deslauriers <email address hidden> Tue, 11 Feb 2025 08:51:51 -0500

Source diff to previous version
CVE-2025-26465 MitM

Version: 1:8.9p1-3ubuntu0.10 2024-07-01 13:07:02 UTC

  openssh (1:8.9p1-3ubuntu0.10) jammy-security; urgency=medium

  * SECURITY UPDATE: remote code execution via signal handler race
    condition (LP: #2070497)
    - debian/patches/CVE-2024-6387.patch: don't log in sshsigdie() in log.c.
    - CVE-2024-6387

 -- Marc Deslauriers <email address hidden> Wed, 26 Jun 2024 09:11:55 -0400

Source diff to previous version

Version: 1:8.9p1-3ubuntu0.7 2024-04-17 13:06:53 UTC

  openssh (1:8.9p1-3ubuntu0.7) jammy; urgency=medium

  * d/p/gssapi.patch: fix method_gsskeyex structure and
    userauth_gsskeyex function regarding changes introduced in upstream
    commit dbb339f015c33d63484261d140c84ad875a9e548 ("prepare for
    multiple names for authmethods") (LP: #2053146)
  * d/t/{ssh-gssapi,util}: ssh-gssapi DEP8 test for gssapi-with-mic
    and gssapi-keyex authentication methods

 -- Andreas Hasenack <email address hidden> Fri, 15 Mar 2024 17:28:22 -0300

Source diff to previous version
2053146 openssh 8.9p1 for Jammy auth2-gss patch for gssapi-keyex method is slightly wrong

Version: 1:8.9p1-3ubuntu0.6 2024-01-03 21:07:23 UTC

  openssh (1:8.9p1-3ubuntu0.6) jammy-security; urgency=medium

  * SECURITY UPDATE: incomplete PKCS#11 destination constraints
    - debian/patches/CVE-2023-51384.patch: apply destination constraints to
      all p11 keys in ssh-agent.c.
    - CVE-2023-51384
  * SECURITY UPDATE: command injection via shell metacharacters
    - debian/patches/CVE-2023-51385.patch: ban user/hostnames with most
      shell metacharacters in ssh.c.
    - CVE-2023-51385

 -- Marc Deslauriers <email address hidden> Tue, 02 Jan 2024 11:54:04 -0500

CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during ad
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by a



About   -   Send Feedback to @ubuntu_updates