Vulnerability CVE-2019-17498: Information
Description
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
Severity: HIGH (8.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
libssh2 | sisyphus | 1.9.0-alt2 | 1.11.0-alt2 | ALT-PU-2020-2918-1 | 259110 | Fixed |
libssh2 | sisyphus_e2k | 1.10.0-alt1 | 1.11.0-alt2 | ALT-PU-2021-4814-1 | - | Fixed |
libssh2 | p10 | 1.11.0-alt2 | 1.11.0-alt2 | ALT-PU-2024-1563-2 | 339351 | Fixed |
libssh2 | p10_e2k | 1.11.0-alt2 | 1.11.0-alt2 | ALT-PU-2024-1964-1 | - | Fixed |
libssh2 | p9 | 1.9.0-alt2 | 1.9.0-alt2 | ALT-PU-2020-2949-1 | 259111 | Fixed |
libssh2 | c10f1 | 1.11.0-alt2 | 1.11.0-alt2 | ALT-PU-2024-1973-2 | 340065 | Fixed |
libssh2 | c9f2 | 1.9.0-alt2 | 1.11.0-alt2 | ALT-PU-2021-2150-1 | 276680 | Fixed |