openssh (1:8.9p1-3ubuntu0.11) jammy-security; urgency=medium * SECURITY UPDATE: MitM with VerifyHostKeyDNS option - debian/patches/CVE-2025-26465.patch: fix error code handling in krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c. - CVE-2025-26465 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 11 Feb 2025 08:51:51 -0500 openssh (1:8.9p1-3ubuntu0.10) jammy-security; urgency=medium * SECURITY UPDATE: remote code execution via signal handler race condition (LP: #2070497) - debian/patches/CVE-2024-6387.patch: don't log in sshsigdie() in log.c. - CVE-2024-6387 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 26 Jun 2024 09:11:55 -0400 openssh (1:8.9p1-3ubuntu0.7) jammy; urgency=medium * d/p/gssapi.patch: fix method_gsskeyex structure and userauth_gsskeyex function regarding changes introduced in upstream commit dbb339f015c33d63484261d140c84ad875a9e548 ("prepare for multiple names for authmethods") (LP: #2053146) * d/t/{ssh-gssapi,util}: ssh-gssapi DEP8 test for gssapi-with-mic and gssapi-keyex authentication methods -- Andreas Hasenack <andreas@canonical.com> Fri, 15 Mar 2024 17:28:22 -0300 openssh (1:8.9p1-3ubuntu0.6) jammy-security; urgency=medium * SECURITY UPDATE: incomplete PKCS#11 destination constraints - debian/patches/CVE-2023-51384.patch: apply destination constraints to all p11 keys in ssh-agent.c. - CVE-2023-51384 * SECURITY UPDATE: command injection via shell metacharacters - debian/patches/CVE-2023-51385.patch: ban user/hostnames with most shell metacharacters in ssh.c. - CVE-2023-51385 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 02 Jan 2024 11:54:04 -0500 openssh (1:8.9p1-3ubuntu0.5) jammy-security; urgency=medium * SECURITY UPDATE: Prefix truncation attack on BPP - debian/patches/CVE-2023-48795.patch: implement "strict key exchange" in PROTOCOL, kex.c, kex.h, packet.c, sshconnect2.c, sshd.c. - CVE-2023-48795 * SECURITY UPDATE: smartcard constraints not added to agent - debian/patches/CVE-2023-28531.patch: include destination constraints for smartcard keys too in authfd.c. - CVE-2023-28531 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 18 Dec 2023 11:28:16 -0500 openssh (1:8.9p1-3ubuntu0.4) jammy; urgency=medium * d/p/fix-authorized-principals-command.patch: Fix the situation where sshd ignores AuthorizedPrincipalsCommand if AuthorizedKeysCommand is also set by checking if the value pointed to by the pointer 'charptr' is NULL. (LP: #2031942) -- Michal Maloszewski <michal.maloszewski@canonical.com> Thu, 24 Aug 2023 15:40:24 +0200 openssh (1:8.9p1-3ubuntu0.3) jammy-security; urgency=medium * SECURITY UPDATE: remote code execution relating to PKCS#11 providers - debian/patches/CVE-2023-38408-1.patch: terminate process if requested to load a PKCS#11 provider that isn't a PKCS#11 provider in ssh-pkcs11.c. - debian/patches/CVE-2023-38408-2.patch: disallow remote addition of FIDO/PKCS11 provider in ssh-agent.1, ssh-agent.c. - debian/patches/CVE-2023-38408-3.patch: ensure FIDO/PKCS11 libraries contain expected symbols in misc.c, misc.h, ssh-pkcs11.c, ssh-sk.c. - CVE-2023-38408 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 19 Jul 2023 15:41:52 -0400 openssh (1:8.9p1-3ubuntu0.1) jammy; urgency=medium * d/p/fix-poll-spin.patch: Fix poll(2) spin when a channel's output fd closes without data in the channel buffer. (LP: #1986521) -- Bryce Harrington <bryce@canonical.com> Tue, 22 Nov 2022 23:38:19 -0800 openssh (1:8.9p1-3) unstable; urgency=medium * Allow ppoll_time64 in seccomp filter (closes: #1006445). -- Colin Watson <cjwatson@debian.org> Fri, 25 Feb 2022 23:30:49 +0000 openssh (1:8.9p1-2) unstable; urgency=medium * Improve detection of -fzero-call-used-regs=all support. -- Colin Watson <cjwatson@debian.org> Thu, 24 Feb 2022 16:09:56 +0000 # For older changelog entries, run 'apt-get changelog openssh-client'
Generated by dwww version 1.14 on Fri Feb 28 15:55:00 CET 2025.