Ubuntu 5666-1: OpenSSH vulnerability | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5666-1
October 10, 2022

openssh vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

OpenSSH could be made to run arbitrary code if it some
non-default configuration are in use.

Software Description:
- openssh: secure shell (SSH) for secure access to remote machines

Details:

It was discovered that OpenSSH incorrectly handled certain helper programs.
An attacker could possibly use this issue to arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  openssh-server                  1:7.2p2-4ubuntu2.10+esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5666-1
  CVE-2021-41617

Ubuntu 5666-1: OpenSSH vulnerability

October 10, 2022
OpenSSH could be made to run arbitrary code if it some non-default configuration are in use.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: OpenSSH could be made to run arbitrary code if it some non-default configuration are in use. Software Description: - openssh: secure shell (SSH) for secure access to remote machines Details: It was discovered that OpenSSH incorrectly handled certain helper programs. An attacker could possibly use this issue to arbitrary code execution.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: openssh-server 1:7.2p2-4ubuntu2.10+esm2 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5666-1

CVE-2021-41617

Severity
Ubuntu Security Notice USN-5666-1

Package Information

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.