UbuntuUpdates.org

Package "openssh"

Name: openssh

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • OpenSSH regression tests
  • interactive X program to prompt users for a passphrase for ssh-add

Latest version: 1:9.0p1-1ubuntu8.7
Release: lunar (23.04)
Level: updates
Repository: universe

Links



Other versions of "openssh" in Lunar

Repository Area Version
base main 1:9.0p1-1ubuntu8
base universe 1:9.0p1-1ubuntu8
security main 1:9.0p1-1ubuntu8.7
security universe 1:9.0p1-1ubuntu8.7
updates main 1:9.0p1-1ubuntu8.7

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1:9.0p1-1ubuntu8.7 2024-01-03 21:07:25 UTC

  openssh (1:9.0p1-1ubuntu8.7) lunar-security; urgency=medium

  * SECURITY UPDATE: incomplete PKCS#11 destination constraints
    - debian/patches/CVE-2023-51384.patch: apply destination constraints to
      all p11 keys in ssh-agent.c.
    - CVE-2023-51384
  * SECURITY UPDATE: command injection via shell metacharacters
    - debian/patches/CVE-2023-51385.patch: ban user/hostnames with most
      shell metacharacters in ssh.c.
    - CVE-2023-51385

 -- Marc Deslauriers <email address hidden> Tue, 02 Jan 2024 11:45:12 -0500

Source diff to previous version
CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during ad
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by a

Version: 1:9.0p1-1ubuntu8.6 2023-12-19 17:07:40 UTC

  openssh (1:9.0p1-1ubuntu8.6) lunar-security; urgency=medium

  * SECURITY UPDATE: Prefix truncation attack on BPP
    - debian/patches/CVE-2023-48795.patch: implement "strict key exchange"
      in PROTOCOL, kex.c, kex.h, packet.c, sshconnect2.c, sshd.c.
    - CVE-2023-48795
  * SECURITY UPDATE: smartcard constraints not added to agent
    - debian/patches/CVE-2023-28531.patch: include destination constraints
      for smartcard keys too in authfd.c.
    - CVE-2023-28531

 -- Marc Deslauriers <email address hidden> Mon, 18 Dec 2023 11:00:34 -0500

Source diff to previous version
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integri
CVE-2023-28531 ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is

Version: 1:9.0p1-1ubuntu8.5 2023-09-14 17:06:57 UTC

  openssh (1:9.0p1-1ubuntu8.5) lunar; urgency=medium

  * d/p/fix-authorized-principals-command.patch: Fix the situation where
    sshd ignores AuthorizedPrincipalsCommand if AuthorizedKeysCommand
    is also set by checking if the value pointed to by the pointer
    'charptr' is NULL. (LP: #2031942)

 -- Michal Maloszewski <email address hidden> Thu, 24 Aug 2023 15:52:47 +0200

Source diff to previous version
2031942 AuthorizedPrincipalsCommand is ignored if AuthorizedKeysCommand is set

Version: 1:9.0p1-1ubuntu8.4 2023-07-24 19:07:18 UTC

  openssh (1:9.0p1-1ubuntu8.4) lunar-security; urgency=medium

  * SECURITY UPDATE: remote code execution relating to PKCS#11 providers
    - debian/patches/CVE-2023-38408-1.patch: terminate process if requested
      to load a PKCS#11 provider that isn't a PKCS#11 provider in
      ssh-pkcs11.c.
    - debian/patches/CVE-2023-38408-2.patch: disallow remote addition of
      FIDO/PKCS11 provider in ssh-agent.1, ssh-agent.c.
    - debian/patches/CVE-2023-38408-3.patch: ensure FIDO/PKCS11 libraries
      contain expected symbols in misc.c, misc.h, ssh-pkcs11.c, ssh-sk.c.
    - CVE-2023-38408

 -- Marc Deslauriers <email address hidden> Wed, 19 Jul 2023 15:40:25 -0400

Source diff to previous version
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent

Version: 1:9.0p1-1ubuntu8.2 2023-06-14 18:07:05 UTC

  openssh (1:9.0p1-1ubuntu8.2) lunar; urgency=medium

  * debian/patches/systemd-socket-activation.patch: do not leak sockets in
    child process. Follow-up fix for LP: #2011458.

 -- Nick Rosbrook <email address hidden> Fri, 26 May 2023 10:44:48 -0400

2011458 ssh fails to rebind when it is killed with -HUP



About   -   Send Feedback to @ubuntu_updates