UbuntuUpdates.org

Package "openssh"

Name: openssh

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • secure shell (SSH) client, for secure access to remote machines
  • secure shell (SSH) server, for secure access from remote machines
  • secure shell (SSH) sftp server module, for SFTP access from remote machines
  • secure shell client and server (metapackage)

Latest version: 1:9.6p1-3ubuntu13.5
Release: noble (24.04)
Level: updates
Repository: main

Links



Other versions of "openssh" in Noble

Repository Area Version
base universe 1:9.6p1-3ubuntu13
base main 1:9.6p1-3ubuntu13
security universe 1:9.6p1-3ubuntu13.4
security main 1:9.6p1-3ubuntu13.4
updates universe 1:9.6p1-3ubuntu13.5
proposed universe 1:9.6p1-3ubuntu13.7
proposed main 1:9.6p1-3ubuntu13.7

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: *DELETED* 2024-11-08 18:06:55 UTC
No changelog for deleted or moved packages.

Version: 1:9.6p1-3ubuntu13.7 2024-11-07 22:06:55 UTC

  openssh (1:9.6p1-3ubuntu13.7) noble; urgency=medium

  * d/t/sshd-socket-generator: run test_match_on_port test
    The test case was added to verify the fix for LP: 2076023,
    but it is not actually executed at the moment. Now that
    it does run, fix the grep commands used.

Source diff to previous version

Version: 1:9.6p1-3ubuntu13.5 2024-08-22 17:07:21 UTC

  openssh (1:9.6p1-3ubuntu13.5) noble-proposed; urgency=medium

  * SRU: LP: #2076340: No-change rebuild to pick up changed build flags
    on ppc64 and s390x.

 -- Matthias Klose <email address hidden> Fri, 09 Aug 2024 04:33:22 +0200

Source diff to previous version

Version: 1:9.6p1-3ubuntu13.4 2024-07-09 18:07:37 UTC

  openssh (1:9.6p1-3ubuntu13.4) noble-security; urgency=medium

  * SECURITY UPDATE: timing attack against echo-off password entry
    - debian/patches/CVE-2024-39894.patch: don't rely on
      channel_did_enqueue in clientloop.c
    - CVE-2024-39894

 -- Marc Deslauriers <email address hidden> Tue, 09 Jul 2024 07:31:27 -0400

Source diff to previous version
CVE-2024-39894 OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeyst

Version: 1:9.6p1-3ubuntu13.3 2024-07-01 13:07:06 UTC

  openssh (1:9.6p1-3ubuntu13.3) noble-security; urgency=medium

  * SECURITY UPDATE: remote code execution via signal handler race
    condition (LP: #2070497)
    - debian/patches/CVE-2024-6387.patch: don't log in sshsigdie() in log.c.
    - CVE-2024-6387

 -- Marc Deslauriers <email address hidden> Wed, 26 Jun 2024 09:07:08 -0400




About   -   Send Feedback to @ubuntu_updates