UbuntuUpdates.org

Package "openssh"

Name: openssh

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • secure shell (SSH) client, for secure access to remote machines
  • secure shell (SSH) server, for secure access from remote machines
  • secure shell (SSH) sftp server module, for SFTP access from remote machines
  • secure shell client and server (metapackage)

Latest version: 1:8.9p1-3ubuntu0.14
Release: jammy (22.04)
Level: security
Repository: main

Links



Other versions of "openssh" in Jammy

Repository Area Version
base main 1:8.9p1-3
base universe 1:8.9p1-3
security universe 1:8.9p1-3ubuntu0.14
updates main 1:8.9p1-3ubuntu0.14
updates universe 1:8.9p1-3ubuntu0.14

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1:8.9p1-3ubuntu0.14 2026-03-12 23:09:36 UTC

  openssh (1:8.9p1-3ubuntu0.14) jammy-security; urgency=medium

  * SECURITY UPDATE: GSSAPI Key Exchange issue
    - debian/patches/gssapi.patch: replace incorrect use of
      sshpkt_disconnect() with ssh_packet_disconnect() and properly
      initialize some vars.
    - CVE-2026-3497
  * SECURITY UPDATE: Untrusted control characters in usernames
    - debian/patches/CVE-2025-61984.patch: refuse usernames that include
      control characters in ssh.c.
    - CVE-2025-61984
  * SECURITY UPDATE: Code execution in ProxyCommand via NULL character
    - debian/patches/CVE-2025-61985.patch: don't allow \0 characters in
      url-encoded strings in misc.c.
    - CVE-2025-61985

 -- Marc Deslauriers <email address hidden> Wed, 04 Mar 2026 12:55:04 -0500

Source diff to previous version
CVE-2026-3497 Vulnerability in the OpenSSH GSSAPI delta included in various Linux di ...
CVE-2025-61984 ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code
CVE-2025-61985 ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

Version: 1:8.9p1-3ubuntu0.13 2025-04-24 14:07:09 UTC

  openssh (1:8.9p1-3ubuntu0.13) jammy-security; urgency=medium

  * SECURITY UPDATE: incorrect DisableForwarding directive behaviour
    - debian/patches/CVE-2025-32728.patch: fix logic error in session.c.
    - CVE-2025-32728

 -- Marc Deslauriers <email address hidden> Fri, 11 Apr 2025 08:05:47 -0400

Source diff to previous version
CVE-2025-32728 In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwardin

Version: 1:8.9p1-3ubuntu0.11 2025-02-18 19:07:01 UTC

  openssh (1:8.9p1-3ubuntu0.11) jammy-security; urgency=medium

  * SECURITY UPDATE: MitM with VerifyHostKeyDNS option
    - debian/patches/CVE-2025-26465.patch: fix error code handling in
      krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c.
    - CVE-2025-26465

 -- Marc Deslauriers <email address hidden> Tue, 11 Feb 2025 08:51:51 -0500

Source diff to previous version
CVE-2025-26465 MitM

Version: 1:8.9p1-3ubuntu0.10 2024-07-01 11:07:12 UTC

  openssh (1:8.9p1-3ubuntu0.10) jammy-security; urgency=medium

  * SECURITY UPDATE: remote code execution via signal handler race
    condition (LP: #2070497)
    - debian/patches/CVE-2024-6387.patch: don't log in sshsigdie() in log.c.
    - CVE-2024-6387

 -- Marc Deslauriers <email address hidden> Wed, 26 Jun 2024 09:11:55 -0400

Source diff to previous version

Version: 1:8.9p1-3ubuntu0.6 2024-01-03 20:07:56 UTC

  openssh (1:8.9p1-3ubuntu0.6) jammy-security; urgency=medium

  * SECURITY UPDATE: incomplete PKCS#11 destination constraints
    - debian/patches/CVE-2023-51384.patch: apply destination constraints to
      all p11 keys in ssh-agent.c.
    - CVE-2023-51384
  * SECURITY UPDATE: command injection via shell metacharacters
    - debian/patches/CVE-2023-51385.patch: ban user/hostnames with most
      shell metacharacters in ssh.c.
    - CVE-2023-51385

 -- Marc Deslauriers <email address hidden> Tue, 02 Jan 2024 11:54:04 -0500

CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during ad
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by a



About   -   Send Feedback to @ubuntu_updates