Total vulnerabilities in the database
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
Software | From | Fixed in |
---|---|---|
libssh2 / libssh2 | 1.2.8 | 1.8.0.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |
opensuse / leap | 42.3 | 42.3.x |
opensuse / leap | 15.0 | 15.0.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux_server_tus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_eus | 7.6 | 7.6.x |
redhat / enterprise_linux_server_aus | 7.6 | 7.6.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
fedoraproject / fedora | 28 | 28.x |
oracle / peoplesoft_enterprise_peopletools | 8.56 | 8.56.x |
oracle / peoplesoft_enterprise_peopletools | 8.57 | 8.57.x |