An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.11.1-1ubuntu0.1~esm2", "binary_name": "python-asyncssh-doc" }, { "binary_version": "1.11.1-1ubuntu0.1~esm2", "binary_name": "python3-asyncssh" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.12.2-1ubuntu0.2", "binary_name": "python-asyncssh-doc" }, { "binary_version": "1.12.2-1ubuntu0.2", "binary_name": "python3-asyncssh" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.5.0-1ubuntu0.1", "binary_name": "python-asyncssh-doc" }, { "binary_version": "2.5.0-1ubuntu0.1", "binary_name": "python3-asyncssh" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.10.1-2ubuntu0.1+esm1", "binary_name": "python-asyncssh-doc" }, { "binary_version": "2.10.1-2ubuntu0.1+esm1", "binary_name": "python3-asyncssh" } ] }