USN-3809-2

Source
https://ubuntu.com/security/notices/USN-3809-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3809-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3809-2
Published
2021-08-12T11:59:35Z
Modified
2026-02-10T04:41:26Z
Summary
openssh regression
Details

USN-3809-1 fixed vulnerabilities in OpenSSH. The update for CVE-2018-15473 was incomplete and could introduce a regression in certain environments. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Robert Swiecki discovered that OpenSSH incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-10708)

It was discovered that OpenSSH incorrectly handled certain requests. An attacker could possibly use this issue to access sensitive information. (CVE-2018-15473)

References

Affected packages

Ubuntu:18.04:LTS / openssh

Package

Name
openssh
Purl
pkg:deb/ubuntu/openssh@1:7.6p1-4ubuntu0.5?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:7.6p1-4ubuntu0.5

Affected versions

1:7.*
1:7.5p1-10
1:7.6p1-4
1:7.6p1-4ubuntu0.1
1:7.6p1-4ubuntu0.2
1:7.6p1-4ubuntu0.3

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1:7.6p1-4ubuntu0.5",
            "binary_name": "openssh-client"
        },
        {
            "binary_version": "1:7.6p1-4ubuntu0.5",
            "binary_name": "openssh-server"
        },
        {
            "binary_version": "1:7.6p1-4ubuntu0.5",
            "binary_name": "openssh-sftp-server"
        },
        {
            "binary_version": "1:7.6p1-4ubuntu0.5",
            "binary_name": "ssh"
        },
        {
            "binary_version": "1:7.6p1-4ubuntu0.5",
            "binary_name": "ssh-askpass-gnome"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3809-2.json"
cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:18.04:LTS"
}