UbuntuUpdates.org

Package "openssh-server"

Name: openssh-server

Description:

secure shell (SSH) server, for secure access from remote machines

Latest version: 1:9.6p1-3ubuntu13.8
Release: noble (24.04)
Level: updates
Repository: main
Head package: openssh
Homepage: https://www.openssh.com/

Links


Download "openssh-server"


Other versions of "openssh-server" in Noble

Repository Area Version
base main 1:9.6p1-3ubuntu13
security main 1:9.6p1-3ubuntu13.8
proposed main 1:9.6p1-3ubuntu13.9

Changelog

Version: 1:9.6p1-3ubuntu13.8 2025-02-18 22:07:28 UTC

  openssh (1:9.6p1-3ubuntu13.8) noble-security; urgency=medium

  * SECURITY UPDATE: MitM with VerifyHostKeyDNS option
    - debian/patches/CVE-2025-26465.patch: fix error code handling in
      krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c.
    - CVE-2025-26465
  * SECURITY UPDATE: pre-authentication denial of service
    - debian/patches/CVE-2025-26466.patch: don't reply to PING in preauth
      or in KEX in packet.c.
    - CVE-2025-26466
  * NOTE: this package does _not_ contain the changes from
    (1:9.6p1-3ubuntu13.7) in noble-proposed.

 -- Marc Deslauriers <email address hidden> Tue, 11 Feb 2025 08:41:04 -0500

CVE-2025-26465 MitM
CVE-2025-26466 Denial of Service: asymmetric resource consumption of memory and CPU

Version: *DELETED* 2024-11-08 18:06:55 UTC
No changelog for deleted or moved packages.

Version: 1:9.6p1-3ubuntu13.7 2024-11-07 22:06:55 UTC

  openssh (1:9.6p1-3ubuntu13.7) noble; urgency=medium

  * d/t/sshd-socket-generator: run test_match_on_port test
    The test case was added to verify the fix for LP: 2076023,
    but it is not actually executed at the moment. Now that
    it does run, fix the grep commands used.

Source diff to previous version

Version: 1:9.6p1-3ubuntu13.5 2024-08-22 17:07:21 UTC

  openssh (1:9.6p1-3ubuntu13.5) noble-proposed; urgency=medium

  * SRU: LP: #2076340: No-change rebuild to pick up changed build flags
    on ppc64 and s390x.

 -- Matthias Klose <email address hidden> Fri, 09 Aug 2024 04:33:22 +0200

Source diff to previous version

Version: 1:9.6p1-3ubuntu13.4 2024-07-09 18:07:37 UTC

  openssh (1:9.6p1-3ubuntu13.4) noble-security; urgency=medium

  * SECURITY UPDATE: timing attack against echo-off password entry
    - debian/patches/CVE-2024-39894.patch: don't rely on
      channel_did_enqueue in clientloop.c
    - CVE-2024-39894

 -- Marc Deslauriers <email address hidden> Tue, 09 Jul 2024 07:31:27 -0400

CVE-2024-39894 OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeyst



About   -   Send Feedback to @ubuntu_updates