It was discovered that libssh incorrectly handled the ProxyCommand and the ProxyJump features. A remote attacker could possibly use this issue to inject malicious code into the command of the features mentioned through the hostname parameter. (CVE-2023-6004)
It was discovered that libssh incorrectly handled return codes when performing message digest operations. A remote attacker could possibly use this issue to cause libssh to crash, obtain sensitive information, or execute arbitrary code. (CVE-2023-6918)
{ "availability": "No subscription required", "binaries": [ { "libssh-dev": "0.9.3-2ubuntu2.5", "libssh-gcrypt-dev": "0.9.3-2ubuntu2.5", "libssh-gcrypt-4-dbgsym": "0.9.3-2ubuntu2.5", "libssh-gcrypt-4": "0.9.3-2ubuntu2.5", "libssh-4-dbgsym": "0.9.3-2ubuntu2.5", "libssh-doc": "0.9.3-2ubuntu2.5", "libssh-4": "0.9.3-2ubuntu2.5" } ] }
{ "availability": "No subscription required", "binaries": [ { "libssh-dev": "0.9.6-2ubuntu0.22.04.3", "libssh-gcrypt-dev": "0.9.6-2ubuntu0.22.04.3", "libssh-gcrypt-4-dbgsym": "0.9.6-2ubuntu0.22.04.3", "libssh-gcrypt-4": "0.9.6-2ubuntu0.22.04.3", "libssh-4-dbgsym": "0.9.6-2ubuntu0.22.04.3", "libssh-doc": "0.9.6-2ubuntu0.22.04.3", "libssh-4": "0.9.6-2ubuntu0.22.04.3" } ] }
{ "availability": "No subscription required", "binaries": [ { "libssh-dev": "0.10.5-3ubuntu1.2", "libssh-gcrypt-dev": "0.10.5-3ubuntu1.2", "libssh-gcrypt-4-dbgsym": "0.10.5-3ubuntu1.2", "libssh-gcrypt-4": "0.10.5-3ubuntu1.2", "libssh-4-dbgsym": "0.10.5-3ubuntu1.2", "libssh-doc": "0.10.5-3ubuntu1.2", "libssh-4": "0.10.5-3ubuntu1.2" } ] }