First published: Tue Dec 19 2023(Updated: )
Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH protocol was vulnerable to a prefix truncation attack. If a remote attacker was able to intercept SSH communications, extension negotiation messages could be truncated, possibly leading to certain algorithms and features being downgraded. This issue is known as the Terrapin attack. This update adds protocol extensions to mitigate this issue. (CVE-2023-48795) Luci Stanescu discovered that OpenSSH incorrectly added destination constraints when smartcard keys were added to ssh-agent, contrary to expectations. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-28531)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/openssh-client | <1:9.3p1-1ubuntu3.1 | 1:9.3p1-1ubuntu3.1 |
=23.10 | ||
All of | ||
ubuntu/openssh-server | <1:9.3p1-1ubuntu3.1 | 1:9.3p1-1ubuntu3.1 |
=23.10 | ||
All of | ||
ubuntu/openssh-client | <1:9.0p1-1ubuntu8.6 | 1:9.0p1-1ubuntu8.6 |
=23.04 | ||
All of | ||
ubuntu/openssh-server | <1:9.0p1-1ubuntu8.6 | 1:9.0p1-1ubuntu8.6 |
=23.04 | ||
All of | ||
ubuntu/openssh-client | <1:8.9p1-3ubuntu0.5 | 1:8.9p1-3ubuntu0.5 |
=22.04 | ||
All of | ||
ubuntu/openssh-server | <1:8.9p1-3ubuntu0.5 | 1:8.9p1-3ubuntu0.5 |
=22.04 | ||
All of | ||
ubuntu/openssh-client | <1:8.2p1-4ubuntu0.10 | 1:8.2p1-4ubuntu0.10 |
=20.04 | ||
All of | ||
ubuntu/openssh-server | <1:8.2p1-4ubuntu0.10 | 1:8.2p1-4ubuntu0.10 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.