Количество 14
Количество 14

BDU:2024-00200
Уязвимость библиотеки libssh, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20240328-06
Множественные уязвимости libssh

CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

CVE-2023-6918
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message d ...
GHSA-gpcj-wh2f-rr23
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

RLSA-2024:3233
Low: libssh security update
ELSA-2024-3233
ELSA-2024-3233: libssh security update (LOW)
ELSA-2024-2504
ELSA-2024-2504: libssh security update (LOW)

SUSE-SU-2024:0140-1
Security update for libssh

SUSE-SU-2024:0539-1
Security update for libssh

SUSE-SU-2024:0525-1
Security update for libssh
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-00200 Уязвимость библиотеки libssh, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | ROS-20240328-06 Множественные уязвимости libssh | CVSS3: 5.3 | около 1 года назад | |
![]() | CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message d ... | CVSS3: 3.7 | 0% Низкий | больше 1 года назад | |
GHSA-gpcj-wh2f-rr23 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 1 года назад | |
![]() | RLSA-2024:3233 Low: libssh security update | около 1 года назад | ||
ELSA-2024-3233 ELSA-2024-3233: libssh security update (LOW) | около 1 года назад | |||
ELSA-2024-2504 ELSA-2024-2504: libssh security update (LOW) | около 1 года назад | |||
![]() | SUSE-SU-2024:0140-1 Security update for libssh | больше 1 года назад | ||
![]() | SUSE-SU-2024:0539-1 Security update for libssh | больше 1 года назад | ||
![]() | SUSE-SU-2024:0525-1 Security update for libssh | больше 1 года назад |
Уязвимостей на страницу