Количество 21
Количество 21

RLSA-2024:3233
Low: libssh security update
ELSA-2024-3233
ELSA-2024-3233: libssh security update (LOW)
ELSA-2024-2504
ELSA-2024-2504: libssh security update (LOW)

ROS-20240328-06
Множественные уязвимости libssh

SUSE-SU-2024:0140-1
Security update for libssh

SUSE-SU-2024:0539-1
Security update for libssh

SUSE-SU-2024:0525-1
Security update for libssh

CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVE-2023-6918
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message d ...

CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.

CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.

CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.

CVE-2023-6004
CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump ...
GHSA-gpcj-wh2f-rr23
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
GHSA-f35j-mfvw-p857
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.

BDU:2024-00200
Уязвимость библиотеки libssh, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | RLSA-2024:3233 Low: libssh security update | около 1 года назад | ||
ELSA-2024-3233 ELSA-2024-3233: libssh security update (LOW) | около 1 года назад | |||
ELSA-2024-2504 ELSA-2024-2504: libssh security update (LOW) | около 1 года назад | |||
![]() | ROS-20240328-06 Множественные уязвимости libssh | CVSS3: 5.3 | около 1 года назад | |
![]() | SUSE-SU-2024:0140-1 Security update for libssh | больше 1 года назад | ||
![]() | SUSE-SU-2024:0539-1 Security update for libssh | больше 1 года назад | ||
![]() | SUSE-SU-2024:0525-1 Security update for libssh | больше 1 года назад | ||
![]() | CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message d ... | CVSS3: 3.7 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 4.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 4.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 4.8 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 4.8 | 0% Низкий | 3 месяца назад | |
CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump ... | CVSS3: 4.8 | 0% Низкий | больше 1 года назад | |
GHSA-gpcj-wh2f-rr23 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 1 года назад | |
GHSA-f35j-mfvw-p857 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 3.9 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2024-00200 Уязвимость библиотеки libssh, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу