Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: python312Packages.ansible-pylibssh

Found 10 matching suggestions

created 4 months, 3 weeks ago
Libssh: double free vulnerability in libssh key export functions

A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.

Affected products

rhcos
libssh
  • <0.11.2
libssh2

Matching in nixpkgs

pkgs.libssh

SSH client library

  • nixos-unstable -

pkgs.libssh2

Client-side C library implementing the SSH2 protocol

  • nixos-unstable -

Package maintainers

created 4 months, 3 weeks ago
Libssh: incorrect return code handling in ssh_kdf() in libssh

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

Affected products

rhcos
libssh
  • <0.11.2
  • *
libssh2

Matching in nixpkgs

pkgs.libssh

SSH client library

  • nixos-unstable -

pkgs.libssh2

Client-side C library implementing the SSH2 protocol

  • nixos-unstable -

Package maintainers

created 4 months, 3 weeks ago
Libssh: out-of-bounds read in sftp_handle()

A flaw was found in the libssh library. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.

Affected products

rhcos
  • *
libssh
  • <0.11.2
  • *
rhosdt/tempo-rhel8
  • *
rhaiis/vllm-cuda-rhel9
  • *
rhaiis/vllm-rocm-rhel9
  • *
rhosdt/tempo-query-rhel8
  • *
rhosdt/tempo-gateway-rhel8
  • *
rhaiis/model-opt-cuda-rhel9
  • *
rhosdt/tempo-rhel8-operator
  • *
rhosdt/tempo-gateway-opa-rhel8
  • *
rhosdt/tempo-jaeger-query-rhel8
  • *

Matching in nixpkgs

pkgs.libssh

SSH client library

  • nixos-unstable -

pkgs.libssh2

Client-side C library implementing the SSH2 protocol

  • nixos-unstable -

Package maintainers

created 4 months, 3 weeks ago
Ansible automation platform: insecure websocket used when interacting with eda server

A flaw was found in the ansible automation platform. An insecure WebSocket connection was being used in installation from the Ansible rulebook EDA server. An attacker that has access to any machine in the CIDR block could download all rulebook data from the WebSocket, resulting in loss of confidentiality and integrity of the system.

Affected products

ansible
  • <2.4
ansible-rulebook
  • *
automation-eda-controller
  • *
ansible-automation-platform-installer
  • *

Matching in nixpkgs

pkgs.ansible-cmdb

Generate host overview from ansible fact gathering output

  • nixos-unstable -

pkgs.ansible-doctor

Annotation based documentation for your Ansible roles

  • nixos-unstable -

Package maintainers

created 4 months, 3 weeks ago
Ansible: exposure of sensitive information in ansible vault files due to improper logging

A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.

Affected products

ansible
ansible-core
  • =<2.17.4
  • *
ee-29-container
  • *
ee-minimal-container
  • *
ansible-builder-container
  • *
discovery-server-container
rhelai1/bootc-nvidia-rhel9
discovery/discovery-ui-rhel9
  • *
discovery/discovery-server-rhel9
  • *
ansible-automation-platform/ee-29-rhel8
  • *
ansible-automation-platform/ee-minimal-rhel8
  • *
ansible-automation-platform/ee-minimal-rhel9
  • *
ansible-automation-platform/ansible-builder-rhel8
  • *
ansible-automation-platform/ansible-builder-rhel9
  • *

Matching in nixpkgs

pkgs.ansible-cmdb

Generate host overview from ansible fact gathering output

  • nixos-unstable -

pkgs.ansible-doctor

Annotation based documentation for your Ansible roles

  • nixos-unstable -

Package maintainers

created 4 months, 3 weeks ago
Ansible-core: possible information leak in tasks that ignore ansible_no_log configuration

An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.

Affected products

ansible
  • ==2.15.9
  • <2.14.4
  • <2.16.3
  • ==2.16.3
  • <2.15.9
  • ==2.14.4
ansible-core
  • *

Matching in nixpkgs

pkgs.ansible-cmdb

Generate host overview from ansible fact gathering output

  • nixos-unstable -

pkgs.ansible-doctor

Annotation based documentation for your Ansible roles

  • nixos-unstable -

Package maintainers

created 4 months, 3 weeks ago
Processing sftp server read may cause null dereference

A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users. Given this code is not in any released versions, no security releases have been issued.

Affected products

libssh

Matching in nixpkgs

pkgs.libssh

SSH client library

  • nixos-unstable -

pkgs.libssh2

Client-side C library implementing the SSH2 protocol

  • nixos-unstable -

Package maintainers

created 4 months, 3 weeks ago
Malicious role archive can cause ansible-galaxy to overwrite arbitrary files

An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.

Affected products

ansible
  • ==2.14.11
ansible-core
  • *

Matching in nixpkgs

pkgs.ansible-cmdb

Generate host overview from ansible fact gathering output

  • nixos-unstable -

pkgs.ansible-doctor

Annotation based documentation for your Ansible roles

  • nixos-unstable -

Package maintainers

created 4 months, 3 weeks ago
Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname

A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.

Affected products

libssh
  • ==0.9.8
  • ==0.10.6
  • *

Matching in nixpkgs

pkgs.libssh

SSH client library

  • nixos-unstable -

pkgs.libssh2

Client-side C library implementing the SSH2 protocol

  • nixos-unstable -

Package maintainers

created 4 months, 3 weeks ago
Libssh: missing checks for return values for digests

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

Affected products

libssh
  • ==0.9.8
  • ==0.10.6
  • *
libssh2
mingw-libssh2

Matching in nixpkgs

pkgs.libssh

SSH client library

  • nixos-unstable -

pkgs.libssh2

Client-side C library implementing the SSH2 protocol

  • nixos-unstable -

Package maintainers