It was discovered that OpenSSH incorrectly handled supplemental groups when running helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand as a different user. An attacker could possibly use this issue to escalate privileges. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-41617)
It was discovered that OpenSSH incorrectly added destination constraints when PKCS#11 token keys were added to ssh-agent, contrary to expectations. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-51384)
It was discovered that OpenSSH incorrectly handled user names or host names with shell metacharacters. An attacker could possibly use this issue to perform OS command injection. (CVE-2023-51385)
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "openssh-client",
            "binary_version": "1:8.2p1-4ubuntu0.11"
        },
        {
            "binary_name": "openssh-server",
            "binary_version": "1:8.2p1-4ubuntu0.11"
        },
        {
            "binary_name": "openssh-sftp-server",
            "binary_version": "1:8.2p1-4ubuntu0.11"
        },
        {
            "binary_name": "openssh-tests",
            "binary_version": "1:8.2p1-4ubuntu0.11"
        },
        {
            "binary_name": "ssh",
            "binary_version": "1:8.2p1-4ubuntu0.11"
        },
        {
            "binary_name": "ssh-askpass-gnome",
            "binary_version": "1:8.2p1-4ubuntu0.11"
        }
    ]
}
          {
    "cves": [
        {
            "id": "CVE-2021-41617",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ]
        },
        {
            "id": "CVE-2023-51385",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:20.04:LTS"
}
                {
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "openssh-client",
            "binary_version": "1:8.9p1-3ubuntu0.6"
        },
        {
            "binary_name": "openssh-server",
            "binary_version": "1:8.9p1-3ubuntu0.6"
        },
        {
            "binary_name": "openssh-sftp-server",
            "binary_version": "1:8.9p1-3ubuntu0.6"
        },
        {
            "binary_name": "openssh-tests",
            "binary_version": "1:8.9p1-3ubuntu0.6"
        },
        {
            "binary_name": "ssh",
            "binary_version": "1:8.9p1-3ubuntu0.6"
        },
        {
            "binary_name": "ssh-askpass-gnome",
            "binary_version": "1:8.9p1-3ubuntu0.6"
        }
    ]
}
          {
    "cves": [
        {
            "id": "CVE-2023-51384",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2023-51385",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:22.04:LTS"
}