USN-6560-2 fixed a vulnerability in OpenSSH. This update provides the corresponding update for Ubuntu 16.04 LTS.
Original advisory details:
It was discovered that OpenSSH incorrectly handled user names or host names with shell metacharacters. An attacker could possibly use this issue to perform OS command injection.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-client" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-client-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-client-ssh1" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-client-ssh1-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-client-udeb" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-client-udeb-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-server" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-server-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-server-udeb" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-server-udeb-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-sftp-server" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "openssh-sftp-server-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "ssh" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "ssh-askpass-gnome" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "ssh-askpass-gnome-dbgsym" }, { "binary_version": "1:7.2p2-4ubuntu2.10+esm6", "binary_name": "ssh-krb5" } ] }