Количество 22
Количество 22
RLSA-2024:3233
Low: libssh security update
RLSA-2024:2504
Low: libssh security update
ELSA-2024-3233
ELSA-2024-3233: libssh security update (LOW)
ELSA-2024-2504
ELSA-2024-2504: libssh security update (LOW)
ROS-20240328-06
Множественные уязвимости libssh
SUSE-SU-2024:0140-1
Security update for libssh
SUSE-SU-2024:0539-1
Security update for libssh
SUSE-SU-2024:0525-1
Security update for libssh
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
CVE-2023-6918
Libssh: missing checks for return values for digests
CVE-2023-6918
A flaw was found in the libssh implements abstract layer for message d ...
CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
CVE-2023-6004
Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname
CVE-2023-6004
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump ...
GHSA-gpcj-wh2f-rr23
A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
GHSA-f35j-mfvw-p857
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2024:3233 Low: libssh security update | почти 2 года назад | |||
RLSA-2024:2504 Low: libssh security update | 11 месяцев назад | |||
ELSA-2024-3233 ELSA-2024-3233: libssh security update (LOW) | почти 2 года назад | |||
ELSA-2024-2504 ELSA-2024-2504: libssh security update (LOW) | почти 2 года назад | |||
ROS-20240328-06 Множественные уязвимости libssh | CVSS3: 5.3 | почти 2 года назад | ||
SUSE-SU-2024:0140-1 Security update for libssh | около 2 лет назад | |||
SUSE-SU-2024:0539-1 Security update for libssh | около 2 лет назад | |||
SUSE-SU-2024:0525-1 Security update for libssh | около 2 лет назад | |||
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6918 Libssh: missing checks for return values for digests | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6918 A flaw was found in the libssh implements abstract layer for message d ... | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 4.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 4.8 | 0% Низкий | больше 2 лет назад | |
CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 4.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-6004 Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname | CVSS3: 4.8 | 0% Низкий | около 1 года назад | |
CVE-2023-6004 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump ... | CVSS3: 4.8 | 0% Низкий | около 2 лет назад | |
GHSA-gpcj-wh2f-rr23 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection. | CVSS3: 3.7 | 0% Низкий | больше 2 лет назад | |
GHSA-f35j-mfvw-p857 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter. | CVSS3: 3.9 | 0% Низкий | около 2 лет назад |
Уязвимостей на страницу