USN-6560-1 fixed several vulnerabilities in OpenSSH. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH protocol was vulnerable to a prefix truncation attack. If a remote attacker was able to intercept SSH communications, extension negotiation messages could be truncated, possibly leading to certain algorithms and features being downgraded. This issue is known as the Terrapin attack. This update adds protocol extensions to mitigate this issue. (CVE-2023-48795)
It was discovered that OpenSSH incorrectly handled user names or host names with shell metacharacters. An attacker could possibly use this issue to perform OS command injection. This only affected Ubuntu 18.04 LTS. (CVE-2023-51385)
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-client" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-client-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-client-ssh1" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-client-ssh1-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-client-udeb" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-client-udeb-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-server" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-server-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-server-udeb" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-server-udeb-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-sftp-server" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "openssh-sftp-server-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "ssh" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "ssh-askpass-gnome" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "ssh-askpass-gnome-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm5", "binary_name": "ssh-krb5" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "openssh-client" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "openssh-client-dbgsym" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "openssh-client-udeb" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "openssh-server" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "openssh-server-dbgsym" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "openssh-server-udeb" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "openssh-sftp-server" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "openssh-sftp-server-dbgsym" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "ssh" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "ssh-askpass-gnome" }, { "binary_version": "1:7.6p1-4ubuntu0.7+esm3", "binary_name": "ssh-askpass-gnome-dbgsym" } ] }