Количество 12
Количество 12
CVE-2025-5987
A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.
CVE-2025-5987
A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.
CVE-2025-5987
A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.
CVE-2025-5987
Libssh: invalid return code for chacha20 poly1305 with openssl backend
CVE-2025-5987
A flaw was found in libssh when using the ChaCha20 cipher with the Ope ...
RLSA-2025:23484
Moderate: libssh security update
RLSA-2025:23483
Moderate: libssh security update
GHSA-3pvj-q7qj-89fg
A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.
ELSA-2025-23484
ELSA-2025-23484: libssh security update (MODERATE)
ELSA-2025-23483
ELSA-2025-23483: libssh security update (MODERATE)
BDU:2025-07640
Уязвимость функции chacha20_poly1305_set_key() библиотеки libssh, позволяющая нарушителю раскрыть защищаемую информацию
ROS-20250924-09
Множественные уязвимости libssh
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-5987 A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes. | CVSS3: 8.1 | 0% Низкий | 6 месяцев назад | |
CVE-2025-5987 A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes. | CVSS3: 5 | 0% Низкий | 9 месяцев назад | |
CVE-2025-5987 A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes. | CVSS3: 8.1 | 0% Низкий | 6 месяцев назад | |
CVE-2025-5987 Libssh: invalid return code for chacha20 poly1305 with openssl backend | CVSS3: 5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-5987 A flaw was found in libssh when using the ChaCha20 cipher with the Ope ... | CVSS3: 8.1 | 0% Низкий | 6 месяцев назад | |
RLSA-2025:23484 Moderate: libssh security update | 0% Низкий | 29 дней назад | ||
RLSA-2025:23483 Moderate: libssh security update | 0% Низкий | 28 дней назад | ||
GHSA-3pvj-q7qj-89fg A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes. | CVSS3: 5 | 0% Низкий | 6 месяцев назад | |
ELSA-2025-23484 ELSA-2025-23484: libssh security update (MODERATE) | 30 дней назад | |||
ELSA-2025-23483 ELSA-2025-23483: libssh security update (MODERATE) | 29 дней назад | |||
BDU:2025-07640 Уязвимость функции chacha20_poly1305_set_key() библиотеки libssh, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5 | 0% Низкий | 8 месяцев назад | |
ROS-20250924-09 Множественные уязвимости libssh | CVSS3: 6.5 | 4 месяца назад |
Уязвимостей на страницу