{"id":"UBUNTU-CVE-2023-2283","details":"A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.","modified":"2026-02-04T03:36:36.107703Z","published":"2023-05-09T00:00:00Z","related":["USN-6138-1"],"upstream":["CVE-2023-2283"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2283"},{"type":"REPORT","url":"https://www.libssh.org/security/advisories/CVE-2023-2283.txt"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6138-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2023-2283"}],"affected":[{"package":{"name":"libssh","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/libssh@0.9.3-2ubuntu2.3?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.3-2ubuntu2.3"}]}],"versions":["0.9.0-1ubuntu1","0.9.0-1ubuntu4","0.9.0-1ubuntu5","0.9.3-2ubuntu1","0.9.3-2ubuntu2","0.9.3-2ubuntu2.1","0.9.3-2ubuntu2.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libssh-4","binary_version":"0.9.3-2ubuntu2.3"},{"binary_name":"libssh-dev","binary_version":"0.9.3-2ubuntu2.3"},{"binary_name":"libssh-gcrypt-4","binary_version":"0.9.3-2ubuntu2.3"},{"binary_name":"libssh-gcrypt-dev","binary_version":"0.9.3-2ubuntu2.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-2283.json"}},{"package":{"name":"libssh","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/libssh@0.9.6-2ubuntu0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.6-2ubuntu0.22.04.1"}]}],"versions":["0.9.6-1","0.9.6-1build1","0.9.6-2","0.9.6-2build1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libssh-4","binary_version":"0.9.6-2ubuntu0.22.04.1"},{"binary_name":"libssh-dev","binary_version":"0.9.6-2ubuntu0.22.04.1"},{"binary_name":"libssh-gcrypt-4","binary_version":"0.9.6-2ubuntu0.22.04.1"},{"binary_name":"libssh-gcrypt-dev","binary_version":"0.9.6-2ubuntu0.22.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-2283.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}