First published: Mon Jan 22 2024(Updated: )
It was discovered that libssh incorrectly handled the ProxyCommand and the ProxyJump features. A remote attacker could possibly use this issue to inject malicious code into the command of the features mentioned through the hostname parameter. (CVE-2023-6004) It was discovered that libssh incorrectly handled return codes when performing message digest operations. A remote attacker could possibly use this issue to cause libssh to crash, obtain sensitive information, or execute arbitrary code. (CVE-2023-6918)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssh-4 | <0.10.5-3ubuntu1.2 | 0.10.5-3ubuntu1.2 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/libssh-4 | <0.10.4-2ubuntu0.3 | 0.10.4-2ubuntu0.3 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/libssh-4 | <0.9.6-2ubuntu0.22.04.3 | 0.9.6-2ubuntu0.22.04.3 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/libssh-4 | <0.9.3-2ubuntu2.5 | 0.9.3-2ubuntu2.5 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.