Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: haskellPackages.libssh2-conduit

Found 5 matching suggestions

View:
Compact
Detailed
created 1 month ago Activity log
  • Created suggestion
Libssh: libssh: denial of service due to malformed sftp message

A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.

Affected products

rhcos
libssh
libssh2

Matching in nixpkgs

Package maintainers

created 1 month ago Activity log
  • Created suggestion
Libssh: libssh: denial of service via improper configuration file handling

A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.

References

Affected products

rhcos
libssh
libssh2

Matching in nixpkgs

Package maintainers

created 1 month ago Activity log
  • Created suggestion
Libssh: libssh: denial of service via inefficient regular expression processing

A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.

Affected products

rhcos
libssh
libssh2

Matching in nixpkgs

Package maintainers

created 1 month ago Activity log
  • Created suggestion
Libssh: improper sanitation of paths received from scp servers

A malicious SCP server can send unexpected paths that could make the client application override local files outside of working directory. This could be misused to create malicious executable or configuration files and make the user execute them under specific consequences. This is the same issue as in OpenSSH, tracked as CVE-2019-6111.

Affected products

rhcos
libssh
libssh2

Matching in nixpkgs

Package maintainers

created 1 month ago Activity log
  • Created suggestion
Libssh: buffer underflow in ssh_get_hexa() on invalid input

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated), which is vulnerable to the same input (length is provided by the calling application). The function is also used internally in the gssapi code for logging the OIDs received by the server during GSSAPI authentication. This could be triggered remotely, when the server allows GSSAPI authentication and logging verbosity is set at least to SSH_LOG_PACKET (3). This could cause self-DoS of the per-connection daemon process.

Affected products

rhcos
libssh
libssh2

Matching in nixpkgs

Package maintainers