UbuntuUpdates.org

Package "ssh-askpass-gnome"

Name: ssh-askpass-gnome

Description:

interactive X program to prompt users for a passphrase for ssh-add

Latest version: 1:9.3p1-1ubuntu3.6
Release: mantic (23.10)
Level: security
Repository: universe
Head package: openssh
Homepage: https://www.openssh.com/

Links


Download "ssh-askpass-gnome"


Other versions of "ssh-askpass-gnome" in Mantic

Repository Area Version
base universe 1:9.3p1-1ubuntu3
updates universe 1:9.3p1-1ubuntu3.6

Changelog

Version: 1:9.3p1-1ubuntu3.6 2024-07-01 12:07:16 UTC

  openssh (1:9.3p1-1ubuntu3.6) mantic-security; urgency=medium

  * SECURITY UPDATE: remote code execution via signal handler race
    condition (LP: #2070497)
    - debian/patches/CVE-2024-6387.patch: don't log in sshsigdie() in log.c.
    - CVE-2024-6387

 -- Marc Deslauriers <email address hidden> Wed, 26 Jun 2024 09:11:02 -0400

Source diff to previous version

Version: 1:9.3p1-1ubuntu3.2 2024-01-03 20:08:02 UTC

  openssh (1:9.3p1-1ubuntu3.2) mantic-security; urgency=medium

  * SECURITY UPDATE: incomplete PKCS#11 destination constraints
    - debian/patches/CVE-2023-51384.patch: apply destination constraints to
      all p11 keys in ssh-agent.c.
    - CVE-2023-51384
  * SECURITY UPDATE: command injection via shell metacharacters
    - debian/patches/CVE-2023-51385.patch: ban user/hostnames with most
      shell metacharacters in ssh.c.
    - CVE-2023-51385

 -- Marc Deslauriers <email address hidden> Tue, 02 Jan 2024 11:33:40 -0500

Source diff to previous version
CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during ad
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by a

Version: 1:9.3p1-1ubuntu3.1 2023-12-19 15:07:12 UTC

  openssh (1:9.3p1-1ubuntu3.1) mantic-security; urgency=medium

  * SECURITY UPDATE: Prefix truncation attack on BPP
    - debian/patches/CVE-2023-48795.patch: implement "strict key exchange"
      in PROTOCOL, kex.c, kex.h, packet.c, sshconnect2.c.
    - CVE-2023-48795

 -- Marc Deslauriers <email address hidden> Mon, 18 Dec 2023 10:39:17 -0500

CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integri



About   -   Send Feedback to @ubuntu_updates