{"id":"USN-3809-2","summary":"openssh regression","details":"USN-3809-1 fixed vulnerabilities in OpenSSH. The update for CVE-2018-15473\nwas incomplete and could introduce a regression in certain environments.\nThis update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\n Robert Swiecki discovered that OpenSSH incorrectly handled certain messages.\n An attacker could possibly use this issue to cause a denial of service.\n This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.\n (CVE-2016-10708)\n \n It was discovered that OpenSSH incorrectly handled certain requests.\n An attacker could possibly use this issue to access sensitive information.\n (CVE-2018-15473)\n","modified":"2026-02-10T04:41:26Z","published":"2021-08-12T11:59:35Z","references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3809-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/1934501"}],"affected":[{"package":{"name":"openssh","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openssh@1:7.6p1-4ubuntu0.5?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:7.6p1-4ubuntu0.5"}]}],"versions":["1:7.5p1-10","1:7.6p1-4","1:7.6p1-4ubuntu0.1","1:7.6p1-4ubuntu0.2","1:7.6p1-4ubuntu0.3"],"ecosystem_specific":{"binaries":[{"binary_version":"1:7.6p1-4ubuntu0.5","binary_name":"openssh-client"},{"binary_version":"1:7.6p1-4ubuntu0.5","binary_name":"openssh-server"},{"binary_version":"1:7.6p1-4ubuntu0.5","binary_name":"openssh-sftp-server"},{"binary_version":"1:7.6p1-4ubuntu0.5","binary_name":"ssh"},{"binary_version":"1:7.6p1-4ubuntu0.5","binary_name":"ssh-askpass-gnome"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3809-2.json","cves_map":{"cves":[],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}