Search for packages
| purl | pkg:alpm/archlinux/libssh2@1.8.0-3 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-97nz-s1q6-x3fc
Aliases: CVE-2019-3861 |
Out-of-bounds Read An out-of-bounds read flaw was discovered in libssh2 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory. |
Affected by 0 other vulnerabilities. |
|
VCID-bcba-qntz-gkez
Aliases: CVE-2019-3863 |
Out-of-bounds Write A flaw was found in libssh2 A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out-of-bounds memory write error. |
Affected by 0 other vulnerabilities. |
|
VCID-f1me-9vqd-j7f6
Aliases: CVE-2019-3855 |
Out-of-bounds Write An integer overflow flaw which could lead to an out-of-bounds write was discovered in libssh2 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. |
Affected by 0 other vulnerabilities. |
|
VCID-gv2u-298u-jkcv
Aliases: CVE-2019-3859 |
Out-of-bounds Read An out-of-bounds read flaw was discovered in libssh2 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory. |
Affected by 0 other vulnerabilities. |
|
VCID-k1js-k8q3-ekb2
Aliases: CVE-2019-3860 |
Out-of-bounds Read An out-of-bounds read flaw was discovered in libssh2 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory. |
Affected by 0 other vulnerabilities. |
|
VCID-mevw-g6yq-eqa8
Aliases: CVE-2019-3857 |
Out-of-bounds Write An integer overflow flaw which could lead to an out-of-bounds write was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. |
Affected by 0 other vulnerabilities. |
|
VCID-qjzc-2hvn-2qg3
Aliases: CVE-2019-3856 |
Out-of-bounds Write An integer overflow flaw, which could lead to an out-of-bounds write, was discovered in libssh2 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. |
Affected by 0 other vulnerabilities. |
|
VCID-rv81-jwkz-w7b5
Aliases: CVE-2019-3858 |
Out-of-bounds Read An out-of-bounds read flaw was discovered in libssh2 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory. |
Affected by 0 other vulnerabilities. |
|
VCID-sy5b-nfqk-6ucm
Aliases: CVE-2019-3862 |
Out-of-bounds Read An out-of-bounds read flaw was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:24:30.560805+00:00 | Arch Linux Importer | Affected by | VCID-f1me-9vqd-j7f6 | https://security.archlinux.org/AVG-926 | 38.0.0 |
| 2026-04-01T18:24:30.536865+00:00 | Arch Linux Importer | Affected by | VCID-qjzc-2hvn-2qg3 | https://security.archlinux.org/AVG-926 | 38.0.0 |
| 2026-04-01T18:24:30.514566+00:00 | Arch Linux Importer | Affected by | VCID-mevw-g6yq-eqa8 | https://security.archlinux.org/AVG-926 | 38.0.0 |
| 2026-04-01T18:24:30.490015+00:00 | Arch Linux Importer | Affected by | VCID-rv81-jwkz-w7b5 | https://security.archlinux.org/AVG-926 | 38.0.0 |
| 2026-04-01T18:24:30.465806+00:00 | Arch Linux Importer | Affected by | VCID-gv2u-298u-jkcv | https://security.archlinux.org/AVG-926 | 38.0.0 |
| 2026-04-01T18:24:30.439927+00:00 | Arch Linux Importer | Affected by | VCID-k1js-k8q3-ekb2 | https://security.archlinux.org/AVG-926 | 38.0.0 |
| 2026-04-01T18:24:30.415805+00:00 | Arch Linux Importer | Affected by | VCID-97nz-s1q6-x3fc | https://security.archlinux.org/AVG-926 | 38.0.0 |
| 2026-04-01T18:24:30.392037+00:00 | Arch Linux Importer | Affected by | VCID-sy5b-nfqk-6ucm | https://security.archlinux.org/AVG-926 | 38.0.0 |
| 2026-04-01T18:24:30.364909+00:00 | Arch Linux Importer | Affected by | VCID-bcba-qntz-gkez | https://security.archlinux.org/AVG-926 | 38.0.0 |