UbuntuUpdates.org

Package "openssh"

Name: openssh

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • OpenSSH regression tests
  • interactive X program to prompt users for a passphrase for ssh-add

Latest version: 1:8.2p1-4ubuntu0.13
Release: focal (20.04)
Level: security
Repository: universe

Links



Other versions of "openssh" in Focal

Repository Area Version
base main 1:8.2p1-4
base universe 1:8.2p1-4
security main 1:8.2p1-4ubuntu0.13
updates main 1:8.2p1-4ubuntu0.12
updates universe 1:8.2p1-4ubuntu0.12

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1:8.2p1-4ubuntu0.13 2025-04-24 14:07:07 UTC

  openssh (1:8.2p1-4ubuntu0.13) focal-security; urgency=medium

  * SECURITY UPDATE: incorrect DisableForwarding directive behaviour
    - debian/patches/CVE-2025-32728.patch: fix logic error in session.c.
    - CVE-2025-32728

 -- Marc Deslauriers <email address hidden> Fri, 11 Apr 2025 08:16:08 -0400

Source diff to previous version
CVE-2025-32728 In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwardin

Version: 1:8.2p1-4ubuntu0.12 2025-02-18 19:07:00 UTC

  openssh (1:8.2p1-4ubuntu0.12) focal-security; urgency=medium

  * SECURITY UPDATE: MitM with VerifyHostKeyDNS option
    - debian/patches/CVE-2025-26465.patch: fix error code handling in
      krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c.
    - CVE-2025-26465

 -- Marc Deslauriers <email address hidden> Tue, 11 Feb 2025 09:09:35 -0500

Source diff to previous version
CVE-2025-26465 MitM

Version: 1:8.2p1-4ubuntu0.11 2024-01-03 20:07:54 UTC

  openssh (1:8.2p1-4ubuntu0.11) focal-security; urgency=medium

  * SECURITY UPDATE: Supplemental groups not initialized
    - debian/patches/CVE-2021-41617-1.patch: add initgroups()
      before setresgid() in auth.c.
    - debian/patches/CVE-2021-41617-2.patch: add grp.h in auth.c.
    - CVE-2021-41617
  * SECURITY UPDATE: command injection via shell metacharacters
    - debian/patches/CVE-2023-51385.patch: ban user/hostnames with most
      shell metacharacters in ssh.c.
    - CVE-2023-51385

 -- Marc Deslauriers <email address hidden> Tue, 02 Jan 2024 12:13:02 -0500

Source diff to previous version
CVE-2021-41617 sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by a

Version: 1:8.2p1-4ubuntu0.10 2023-12-19 16:08:32 UTC

  openssh (1:8.2p1-4ubuntu0.10) focal-security; urgency=medium

  * SECURITY UPDATE: Prefix truncation attack on BPP
    - debian/patches/CVE-2023-48795.patch: implement "strict key exchange"
      in PROTOCOL, kex.c, kex.h, packet.c, sshconnect2.c, sshd.c.
    - CVE-2023-48795

 -- Marc Deslauriers <email address hidden> Mon, 18 Dec 2023 11:35:39 -0500

Source diff to previous version
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integri

Version: 1:8.2p1-4ubuntu0.9 2023-08-09 08:07:00 UTC

  openssh (1:8.2p1-4ubuntu0.9) focal-security; urgency=medium

  * SECURITY UPDATE: information leak in algorithm negotiation (LP: #2030275)
    - debian/patches/CVE-2020-14145-mitigation.patch: tweak the client
      hostkey preference ordering algorithm in sshconnect2.c.
    - Note: This update does not solve CVE-2020-14145, but does mitigate
      the issue in the specific scenario where the user has a key that
      matches the best-preference default algorithm.

 -- Marc Deslauriers <email address hidden> Fri, 04 Aug 2023 18:02:08 -0400

2030275 Include mitigation for CVE-2020-14145
CVE-2020-14145 The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man



About   -   Send Feedback to @ubuntu_updates