It was discovered that libssh incorrectly handled the ProxyCommand and the
ProxyJump features. A remote attacker could possibly use this issue to
inject malicious code into the command of the features mentioned through
the hostname parameter. (CVE-2023-6004)
It was discovered that libssh incorrectly handled return codes when
performing message digest operations. A remote attacker could possibly use
this issue to cause libssh to crash, obtain sensitive information, or
execute arbitrary code. (CVE-2023-6918)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 23.10 | noarch | libssh-4 | < 0.10.5-3ubuntu1.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libssh-4-dbgsym | < 0.10.5-3ubuntu1.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libssh-dev | < 0.10.5-3ubuntu1.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libssh-doc | < 0.10.5-3ubuntu1.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libssh-gcrypt-4 | < 0.10.5-3ubuntu1.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libssh-gcrypt-4-dbgsym | < 0.10.5-3ubuntu1.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libssh-gcrypt-dev | < 0.10.5-3ubuntu1.2 | UNKNOWN |
Ubuntu | 23.04 | noarch | libssh-4 | < 0.10.4-2ubuntu0.3 | UNKNOWN |
Ubuntu | 23.04 | noarch | libssh-4-dbgsym | < 0.10.4-2ubuntu0.3 | UNKNOWN |
Ubuntu | 23.04 | noarch | libssh-dev | < 0.10.4-2ubuntu0.3 | UNKNOWN |