CVE-2018-15473

Priority
Description
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not
delaying bailout for an invalid authenticating user until after the packet
containing the request has been fully parsed, related to auth2-gss.c,
auth2-hostbased.c, and auth2-pubkey.c.
Notes
sarnoldopenssh-ssh1 is provided for compatibility with old devices that
cannot be upgraded to modern protocols. Thus we may not provide security
support for this package if doing so would prevent access to equipment.
openssh-ssh1 is a *client-only* package, no server-side facility, so
there is no path to leak data
mdeslaurwatch for regressions, see debian ELA-37-3
leosilvafor openss, cosmic is not affected, and so disco too.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):released (1:6.6p1-2ubuntu2.11)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:7.2p2-4ubuntu2.6)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:7.6p1-4ubuntu0.1)
Ubuntu 19.04 (Disco Dingo):not-affected
Ubuntu 19.10 (Eoan Ermine):not-affected
Ubuntu 20.04 (Focal Fossa):not-affected
Package
Upstream:ignored (frozen on openssh 7.5p)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 19.04 (Disco Dingo):not-affected
Ubuntu 19.10 (Eoan Ermine):not-affected
Ubuntu 20.04 (Focal Fossa):not-affected
More Information

Updated: 2019-12-05 19:54:01 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)