It was discovered that the OpenSSH ssh-agent incorrectly handled memory. A remote attacker able to connect to the agent could use this issue to cause it to crash, resulting in a denial of service, or possibly execute arbitrary code.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "openssh-client",
"binary_version": "1:8.2p1-4ubuntu0.2"
},
{
"binary_name": "openssh-server",
"binary_version": "1:8.2p1-4ubuntu0.2"
},
{
"binary_name": "openssh-sftp-server",
"binary_version": "1:8.2p1-4ubuntu0.2"
},
{
"binary_name": "openssh-tests",
"binary_version": "1:8.2p1-4ubuntu0.2"
},
{
"binary_name": "ssh",
"binary_version": "1:8.2p1-4ubuntu0.2"
},
{
"binary_name": "ssh-askpass-gnome",
"binary_version": "1:8.2p1-4ubuntu0.2"
}
]
}