It was discovered that the OpenSSH ssh-agent incorrectly handled memory. A
remote attacker able to connect to the agent could use this issue to cause
it to crash, resulting in a denial of service, or possibly execute
arbitrary code.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.10 | noarch | openssh-client | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | openssh-client-dbgsym | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | openssh-client-udeb | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | openssh-server | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | openssh-server-dbgsym | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | openssh-server-udeb | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | openssh-sftp-server | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | openssh-sftp-server-dbgsym | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | openssh-tests | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | openssh-tests-dbgsym | <Â 1:8.3p1-1ubuntu0.1 | UNKNOWN |