USN-8090-2

Source
https://ubuntu.com/security/notices/USN-8090-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8090-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8090-2
Upstream
Related
Published
2026-03-12T18:31:57Z
Modified
2026-03-17T06:42:45.335557Z
Summary
openssh vulnerabilities
Details

USN-8090-1 fixed vulnerabilities in OpenSSH. This update provides the corresponding updates for Ubuntu 20.04 LTS.

Original advisory details:

Jeremy Brown discovered that the OpenSSH GSSAPI Key Exchange incorrectly handled disconnecting clients. In non-default configurations where the GSSAPIKeyExchange setting is enabled, a remote attacker could use this issue to cause OpenSSH to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2026-3497)

David Leadbeater discovered that OpenSSH incorrectly handled certain control characters in usernames. When untrusted usernames and the ProxyCommand are being used, an attacker could possibly use this issue to execute arbitrary code. (CVE-2025-61984)

David Leadbeater discovered that OpenSSH incorrectly handled NULL characters in ssh:// URIs. When the ProxyCommand is being used, an attacker could possibly use this issue to execute arbitrary code. (CVE-2025-61985)

References

Affected packages

Ubuntu:Pro:20.04:LTS / openssh

Package

Name
openssh
Purl
pkg:deb/ubuntu/openssh@1:8.2p1-4ubuntu0.13+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:8.2p1-4ubuntu0.13+esm1

Affected versions

1:8.*
1:8.0p1-6build1
1:8.1p1-1
1:8.1p1-5
1:8.2p1-4
1:8.2p1-4ubuntu0.1
1:8.2p1-4ubuntu0.2
1:8.2p1-4ubuntu0.3
1:8.2p1-4ubuntu0.4
1:8.2p1-4ubuntu0.5
1:8.2p1-4ubuntu0.7
1:8.2p1-4ubuntu0.8
1:8.2p1-4ubuntu0.9
1:8.2p1-4ubuntu0.10
1:8.2p1-4ubuntu0.11
1:8.2p1-4ubuntu0.12
1:8.2p1-4ubuntu0.13

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "openssh-client",
            "binary_version": "1:8.2p1-4ubuntu0.13+esm1"
        },
        {
            "binary_name": "openssh-server",
            "binary_version": "1:8.2p1-4ubuntu0.13+esm1"
        },
        {
            "binary_name": "openssh-sftp-server",
            "binary_version": "1:8.2p1-4ubuntu0.13+esm1"
        },
        {
            "binary_name": "openssh-tests",
            "binary_version": "1:8.2p1-4ubuntu0.13+esm1"
        },
        {
            "binary_name": "ssh",
            "binary_version": "1:8.2p1-4ubuntu0.13+esm1"
        },
        {
            "binary_name": "ssh-askpass-gnome",
            "binary_version": "1:8.2p1-4ubuntu0.13+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8090-2.json"
cves_map
{
    "ecosystem": "Ubuntu:Pro:20.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-61984"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-61985"
        },
        {
            "severity": [
                {
                    "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
                    "type": "CVSS_V4"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-3497"
        }
    ]
}