USN-6560-3: OpenSSH vulnerability
16 September 2024
OpenSSH could be made to crash or run programs as your login if it received a specially crafted input.
Releases
Packages
- openssh - secure shell (SSH) for secure access to remote machines
Details
USN-6560-2 fixed a vulnerability in OpenSSH. This update provides
the corresponding update for Ubuntu 16.04 LTS.
Original advisory details:
It was discovered that OpenSSH incorrectly handled user names or host
names with shell metacharacters. An attacker could possibly use this
issue to perform OS command injection.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
openssh-client
-
1:7.2p2-4ubuntu2.10+esm6
Available with Ubuntu Pro
-
openssh-server
-
1:7.2p2-4ubuntu2.10+esm6
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6565-1: ssh-askpass-gnome, openssh-tests, openssh-sftp-server, openssh-client, openssh-server, openssh, ssh
- USN-6560-2: ssh-askpass-gnome, openssh-sftp-server, openssh-client, openssh-server, openssh, ssh-krb5, ssh, openssh-client-ssh1