DescriptionA flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1059061

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libssh (PTS)buster0.8.7-1+deb10u1vulnerable
buster (security)0.8.7-1+deb10u2vulnerable
bullseye (security), bullseye0.9.8-0+deb11u1fixed
bookworm, bookworm (security)0.10.6-0+deb12u1fixed
sid, trixie0.10.6-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs

Notes (libssh-0.10.6) (libssh-0.10.6) (libssh-0.10.6) (libssh-0.10.6) (libssh-0.10.6) (libssh-0.10.6) (libssh-0.10.6) (libssh-0.10.6) (libssh-0.10.6) (libssh-0.10.6)
Original patchset introduces a regression (with IPv6 parsing in ssh_options_set API):

Search for package or bug name: Reporting problems