Количество 15
Количество 15
BDU:2024-00200
Уязвимость библиотеки libssh, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20240328-06
Множественные уязвимости libssh
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
CVE-2023-6918
Libssh: missing checks for return values for digests
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message d ...
GHSA-gpcj-wh2f-rr23
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
RLSA-2024:3233
Low: libssh security update
RLSA-2024:2504
Low: libssh security update
ELSA-2024-3233
ELSA-2024-3233: libssh security update (LOW)
ELSA-2024-2504
ELSA-2024-2504: libssh security update (LOW)
SUSE-SU-2024:0140-1
Security update for libssh
SUSE-SU-2024:0539-1
Security update for libssh
SUSE-SU-2024:0525-1
Security update for libssh
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-00200 Уязвимость библиотеки libssh, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад | |
ROS-20240328-06 Множественные уязвимости libssh | CVSS3: 5.3 | почти 2 года назад | ||
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6918 Libssh: missing checks for return values for digests | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message d ... | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
GHSA-gpcj-wh2f-rr23 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
RLSA-2024:3233 Low: libssh security update | почти 2 года назад | |||
RLSA-2024:2504 Low: libssh security update | 11 месяцев назад | |||
ELSA-2024-3233 ELSA-2024-3233: libssh security update (LOW) | почти 2 года назад | |||
ELSA-2024-2504 ELSA-2024-2504: libssh security update (LOW) | почти 2 года назад | |||
SUSE-SU-2024:0140-1 Security update for libssh | около 2 лет назад | |||
SUSE-SU-2024:0539-1 Security update for libssh | около 2 лет назад | |||
SUSE-SU-2024:0525-1 Security update for libssh | около 2 лет назад |
Уязвимостей на страницу