OpenSSH is vulnerable to remote code execution. The vulnerability exists due to a forwarding of an agent to an attacker-controlled host on an unconstrained agent-socket access on a legacy operating system.
github.com/openssh/openssh-portable/commit/e04fd6dde16de1cdc5a4d9946397ff60d96568db
lists.fedoraproject.org/archives/list/[email protected]/message/KQWGII3LQR4AOTPPFXGMTYE7UDEWIUKI/
lists.fedoraproject.org/archives/list/[email protected]/message/TXST2CML2MWY3PNVUXX7FFJE3ATJMNVZ/
secdb.alpinelinux.org/v3.12/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
security.gentoo.org/glsa/202105-35
security.netapp.com/advisory/ntap-20210416-0002/
www.openssh.com/security.html
www.openssh.com/txt/release-8.5
www.openwall.com/lists/oss-security/2021/03/03/1
www.oracle.com//security-alerts/cpujul2021.html