Количество 12
Количество 12
GHSA-pwrf-jm93-99r3
There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.

CVE-2025-4877
There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.

CVE-2025-4877
There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.

CVE-2025-4877
There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh.
CVE-2025-4877
There's a vulnerability in the libssh package where when a libssh cons ...

BDU:2025-07641
Уязвимость функции ssh_get_fingerprint_hash() библиотеки libssh, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2025:02755-1
Security update for libssh

SUSE-SU-2025:02281-1
Security update for libssh

SUSE-SU-2025:02279-1
Security update for libssh

SUSE-SU-2025:02278-1
Security update for libssh

SUSE-SU-2025:02229-1
Security update for libssh

ROS-20250924-09
Множественные уязвимости libssh
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-pwrf-jm93-99r3 There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh. | CVSS3: 4.5 | 0% Низкий | около 2 месяцев назад | |
![]() | CVE-2025-4877 There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh. | CVSS3: 4.5 | 0% Низкий | около 2 месяцев назад |
![]() | CVE-2025-4877 There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh. | CVSS3: 4.5 | 0% Низкий | 4 месяца назад |
![]() | CVE-2025-4877 There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh. | CVSS3: 4.5 | 0% Низкий | около 2 месяцев назад |
CVE-2025-4877 There's a vulnerability in the libssh package where when a libssh cons ... | CVSS3: 4.5 | 0% Низкий | около 2 месяцев назад | |
![]() | BDU:2025-07641 Уязвимость функции ssh_get_fingerprint_hash() библиотеки libssh, позволяющая нарушителю выполнить произвольный код | CVSS3: 4.5 | 0% Низкий | 6 месяцев назад |
![]() | SUSE-SU-2025:02755-1 Security update for libssh | 2 месяца назад | ||
![]() | SUSE-SU-2025:02281-1 Security update for libssh | 3 месяца назад | ||
![]() | SUSE-SU-2025:02279-1 Security update for libssh | 3 месяца назад | ||
![]() | SUSE-SU-2025:02278-1 Security update for libssh | 3 месяца назад | ||
![]() | SUSE-SU-2025:02229-1 Security update for libssh | 3 месяца назад | ||
![]() | ROS-20250924-09 Множественные уязвимости libssh | CVSS3: 6.5 | 23 дня назад |
Уязвимостей на страницу