{
  "document": {
    "aggregate_severity": {
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: Integer overflow leading to out-of-bounds write when\n     SSH_MSG_CHANNEL_REQUEST packets with exit signal messages are parsed.\n     - debian/patches/CVE-2019-3857.patch: check namelen + 1 does not\n       overflow before allocation in exit-signal handling.\n     - CVE-2019-3857\n   * SECURITY UPDATE: Integer overflow in bounds check in SSH_MSG_DISCONNECT\n     packet parsing enabling out-of-bounds read.\n     - debian/patches/CVE-2019-17498.patch: harden bounds checking in\n       SSH_MSG_DISCONNECT, SSH_MSG_DEBUG, and SSH_MSG_GLOBAL_REQUEST\n       handlers to prevent unsigned integer underflow and overflow.\n     - CVE-2019-17498",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu16.04els/advisories/2026/clsa-2026_1776855642.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-22T11:01:38Z",
      "generator": {
        "date": "2026-04-22T11:01:38Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1776855642",
      "initial_release_date": "2026-04-22T11:01:38Z",
      "revision_history": [
        {
          "date": "2026-04-22T11:01:38Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix CVE(s): CVE-2019-17498, CVE-2019-3857"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 16.04",
                "product": {
                  "name": "Ubuntu 16.04",
                  "product_id": "Ubuntu-16",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
                "product": {
                  "name": "libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
                  "product_id": "libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/libssh2-1-dev@1.5.0-2ubuntu0.1%2Btuxcare.els3?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
                "product": {
                  "name": "libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
                  "product_id": "libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/libssh2-1@1.5.0-2ubuntu0.1%2Btuxcare.els3?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
        },
        "product_reference": "libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
        },
        "product_reference": "libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-3859",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
          "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2019-3859"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html",
          "url": "http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2019/03/18/3",
          "url": "http://www.openwall.com/lists/oss-security/2019/03/18/3"
        },
        {
          "category": "external",
          "summary": "http://www.securityfocus.com/bid/107485",
          "url": "http://www.securityfocus.com/bid/107485"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Apr/25",
          "url": "https://seclists.org/bugtraq/2019/Apr/25"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Mar/25",
          "url": "https://seclists.org/bugtraq/2019/Mar/25"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20190327-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
        },
        {
          "category": "external",
          "summary": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767",
          "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2019/dsa-4431",
          "url": "https://www.debian.org/security/2019/dsa-4431"
        },
        {
          "category": "external",
          "summary": "https://www.libssh2.org/CVE-2019-3859.html",
          "url": "https://www.libssh2.org/CVE-2019-3859.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
          "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
        }
      ],
      "release_date": "2019-03-21T16:01:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T11:00:45.169047Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642",
          "product_ids": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    },
    {
      "cve": "CVE-2019-3857",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
          "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2019-3857"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:0679",
          "url": "https://access.redhat.com/errata/RHSA-2019:0679"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:1175",
          "url": "https://access.redhat.com/errata/RHSA-2019:1175"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:1652",
          "url": "https://access.redhat.com/errata/RHSA-2019:1652"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:1791",
          "url": "https://access.redhat.com/errata/RHSA-2019:1791"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:1943",
          "url": "https://access.redhat.com/errata/RHSA-2019:1943"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:2399",
          "url": "https://access.redhat.com/errata/RHSA-2019:2399"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3857",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3857"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Apr/25",
          "url": "https://seclists.org/bugtraq/2019/Apr/25"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20190327-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2019/dsa-4431",
          "url": "https://www.debian.org/security/2019/dsa-4431"
        },
        {
          "category": "external",
          "summary": "https://www.libssh2.org/CVE-2019-3857.html",
          "url": "https://www.libssh2.org/CVE-2019-3857.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
          "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
        }
      ],
      "release_date": "2019-03-25T19:29:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T11:00:45.169047Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642",
          "product_ids": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2019-3862",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
          "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2019-3862"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html",
          "url": "http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2019/03/18/3",
          "url": "http://www.openwall.com/lists/oss-security/2019/03/18/3"
        },
        {
          "category": "external",
          "summary": "http://www.securityfocus.com/bid/107485",
          "url": "http://www.securityfocus.com/bid/107485"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:1884",
          "url": "https://access.redhat.com/errata/RHSA-2019:1884"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3862",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3862"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Apr/25",
          "url": "https://seclists.org/bugtraq/2019/Apr/25"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Mar/25",
          "url": "https://seclists.org/bugtraq/2019/Mar/25"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20190327-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
        },
        {
          "category": "external",
          "summary": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767",
          "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2019/dsa-4431",
          "url": "https://www.debian.org/security/2019/dsa-4431"
        },
        {
          "category": "external",
          "summary": "https://www.libssh2.org/CVE-2019-3862.html",
          "url": "https://www.libssh2.org/CVE-2019-3862.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2020.html",
          "url": "https://www.oracle.com/security-alerts/cpujan2020.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
          "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
        }
      ],
      "release_date": "2019-03-21T16:01:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T11:00:45.169047Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642",
          "product_ids": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    },
    {
      "cve": "CVE-2019-17498",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
          "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2019-17498"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html",
          "url": "http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html"
        },
        {
          "category": "external",
          "summary": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/",
          "url": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/"
        },
        {
          "category": "external",
          "summary": "https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498",
          "url": "https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498"
        },
        {
          "category": "external",
          "summary": "https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480",
          "url": "https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480"
        },
        {
          "category": "external",
          "summary": "https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c",
          "url": "https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220909-0004/",
          "url": "https://security.netapp.com/advisory/ntap-20220909-0004/"
        }
      ],
      "release_date": "2019-10-21T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T11:00:45.169047Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642",
          "product_ids": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2019-3860",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
          "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2019-3860"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Apr/25",
          "url": "https://seclists.org/bugtraq/2019/Apr/25"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20190327-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2019/dsa-4431",
          "url": "https://www.debian.org/security/2019/dsa-4431"
        },
        {
          "category": "external",
          "summary": "https://www.libssh2.org/CVE-2019-3860.html",
          "url": "https://www.libssh2.org/CVE-2019-3860.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
          "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
        }
      ],
      "release_date": "2019-03-25T19:29:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T11:00:45.169047Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642",
          "product_ids": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    },
    {
      "cve": "CVE-2019-3861",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
          "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2019-3861"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:2136",
          "url": "https://access.redhat.com/errata/RHSA-2019:2136"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3861",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3861"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Apr/25",
          "url": "https://seclists.org/bugtraq/2019/Apr/25"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20190327-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2019/dsa-4431",
          "url": "https://www.debian.org/security/2019/dsa-4431"
        },
        {
          "category": "external",
          "summary": "https://www.libssh2.org/CVE-2019-3861.html",
          "url": "https://www.libssh2.org/CVE-2019-3861.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
          "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
        }
      ],
      "release_date": "2019-03-25T19:29:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T11:00:45.169047Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642",
          "product_ids": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    },
    {
      "cve": "CVE-2019-3858",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
          "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2019-3858"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html",
          "url": "http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2019/03/18/3",
          "url": "http://www.openwall.com/lists/oss-security/2019/03/18/3"
        },
        {
          "category": "external",
          "summary": "http://www.securityfocus.com/bid/107485",
          "url": "http://www.securityfocus.com/bid/107485"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2019:2136",
          "url": "https://access.redhat.com/errata/RHSA-2019:2136"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3858",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3858"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Apr/25",
          "url": "https://seclists.org/bugtraq/2019/Apr/25"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Mar/25",
          "url": "https://seclists.org/bugtraq/2019/Mar/25"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20190327-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
        },
        {
          "category": "external",
          "summary": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767",
          "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2019/dsa-4431",
          "url": "https://www.debian.org/security/2019/dsa-4431"
        },
        {
          "category": "external",
          "summary": "https://www.libssh2.org/CVE-2019-3858.html",
          "url": "https://www.libssh2.org/CVE-2019-3858.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
          "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
        }
      ],
      "release_date": "2019-03-21T21:29:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T11:00:45.169047Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642",
          "product_ids": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1776855642"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "Ubuntu-16:libssh2-1-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64",
            "Ubuntu-16:libssh2-1-dev-0:1.5.0-2ubuntu0.1+tuxcare.els3.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    }
  ]
}