Description: An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation. Broken commit info: Bugfix commit info: https://github.com/ronf/asyncssh/commit/83e43f5ea3470a8617fc388c72b062c7136efd7e' target='_blank' rel='noopener noreferrer https://github.com/ronf/asyncssh/commit/83e43f5ea3470a8617fc388c72b062c7136efd7e https://github.com/ronf/asyncssh/commit/83e43f5ea3470a8617fc388c72b062c7136efd7e" target="_blank" rel="noopener noreferrer
PR: https://e.gitee.com/openanolis/repos/src-anolis-os/python-asyncssh/pulls/2?tab=files