UbuntuUpdates.org

Package "openssh-server"

Name: openssh-server

Description:

secure shell (SSH) server, for secure access from remote machines

Latest version: 1:9.6p1-3ubuntu13.8
Release: noble (24.04)
Level: security
Repository: main
Head package: openssh
Homepage: https://www.openssh.com/

Links


Download "openssh-server"


Other versions of "openssh-server" in Noble

Repository Area Version
base main 1:9.6p1-3ubuntu13
updates main 1:9.6p1-3ubuntu13.8
proposed main 1:9.6p1-3ubuntu13.9

Changelog

Version: 1:9.6p1-3ubuntu13.8 2025-02-18 19:07:03 UTC

  openssh (1:9.6p1-3ubuntu13.8) noble-security; urgency=medium

  * SECURITY UPDATE: MitM with VerifyHostKeyDNS option
    - debian/patches/CVE-2025-26465.patch: fix error code handling in
      krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c.
    - CVE-2025-26465
  * SECURITY UPDATE: pre-authentication denial of service
    - debian/patches/CVE-2025-26466.patch: don't reply to PING in preauth
      or in KEX in packet.c.
    - CVE-2025-26466
  * NOTE: this package does _not_ contain the changes from
    (1:9.6p1-3ubuntu13.7) in noble-proposed.

 -- Marc Deslauriers <email address hidden> Tue, 11 Feb 2025 08:41:04 -0500

Source diff to previous version
CVE-2025-26465 MitM
CVE-2025-26466 Denial of Service: asymmetric resource consumption of memory and CPU

Version: 1:9.6p1-3ubuntu13.4 2024-07-09 17:07:14 UTC

  openssh (1:9.6p1-3ubuntu13.4) noble-security; urgency=medium

  * SECURITY UPDATE: timing attack against echo-off password entry
    - debian/patches/CVE-2024-39894.patch: don't rely on
      channel_did_enqueue in clientloop.c
    - CVE-2024-39894

 -- Marc Deslauriers <email address hidden> Tue, 09 Jul 2024 07:31:27 -0400

Source diff to previous version
CVE-2024-39894 OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeyst

Version: 1:9.6p1-3ubuntu13.3 2024-07-01 11:07:15 UTC

  openssh (1:9.6p1-3ubuntu13.3) noble-security; urgency=medium

  * SECURITY UPDATE: remote code execution via signal handler race
    condition (LP: #2070497)
    - debian/patches/CVE-2024-6387.patch: don't log in sshsigdie() in log.c.
    - CVE-2024-6387

 -- Marc Deslauriers <email address hidden> Wed, 26 Jun 2024 09:07:08 -0400




About   -   Send Feedback to @ubuntu_updates