An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/libssh2/libssh2/pull/476 | patch issue tracking |
https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html | mailing list |
https://security.netapp.com/advisory/ntap-20231006-0002/ |