UbuntuUpdates.org

Package "openssh"

Name: openssh

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • secure shell (SSH) client, for secure access to remote machines
  • secure shell (SSH) server, for secure access from remote machines
  • secure shell (SSH) sftp server module, for SFTP access from remote machines
  • secure shell client and server (metapackage)

Latest version: 1:9.6p1-3ubuntu13.4
Release: noble (24.04)
Level: security
Repository: main

Links



Other versions of "openssh" in Noble

Repository Area Version
base universe 1:9.6p1-3ubuntu13
base main 1:9.6p1-3ubuntu13
security universe 1:9.6p1-3ubuntu13.4
updates universe 1:9.6p1-3ubuntu13.5
updates main 1:9.6p1-3ubuntu13.5
proposed universe 1:9.6p1-3ubuntu13.7
proposed main 1:9.6p1-3ubuntu13.7

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1:9.6p1-3ubuntu13.4 2024-07-09 17:07:14 UTC

  openssh (1:9.6p1-3ubuntu13.4) noble-security; urgency=medium

  * SECURITY UPDATE: timing attack against echo-off password entry
    - debian/patches/CVE-2024-39894.patch: don't rely on
      channel_did_enqueue in clientloop.c
    - CVE-2024-39894

 -- Marc Deslauriers <email address hidden> Tue, 09 Jul 2024 07:31:27 -0400

Source diff to previous version
CVE-2024-39894 OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeyst

Version: 1:9.6p1-3ubuntu13.3 2024-07-01 11:07:15 UTC

  openssh (1:9.6p1-3ubuntu13.3) noble-security; urgency=medium

  * SECURITY UPDATE: remote code execution via signal handler race
    condition (LP: #2070497)
    - debian/patches/CVE-2024-6387.patch: don't log in sshsigdie() in log.c.
    - CVE-2024-6387

 -- Marc Deslauriers <email address hidden> Wed, 26 Jun 2024 09:07:08 -0400




About   -   Send Feedback to @ubuntu_updates