CVE-2025-46807

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-46807
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-46807.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-46807
Downstream
Published
2025-06-02T12:15:24Z
Modified
2025-07-01T16:32:31.108250Z
Summary
[none]
Details

A Allocation of Resources Without Limits or Throttling vulnerability in sslh allows attackers to easily exhaust the file descriptors in sslh and deny legitimate users service.This issue affects sslh before 2.2.4.

References

Affected packages

Debian:11 / sslh

Package

Name
sslh
Purl
pkg:deb/debian/sslh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.20-1
1.20-1.1
1.22c-1

2.*

2.1.1-1
2.1.1-2
2.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sslh

Package

Name
sslh
Purl
pkg:deb/debian/sslh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.20-1
1.20-1.1
1.22c-1

2.*

2.1.1-1
2.1.1-2
2.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / sslh

Package

Name
sslh
Purl
pkg:deb/debian/sslh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.20-1
1.20-1.1
1.22c-1

2.*

2.1.1-1
2.1.1-2
2.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/yrutschle/sslh

Affected ranges

Type
GIT
Repo
https://github.com/yrutschle/sslh
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0
v1.1
v1.10
v1.11
v1.12
v1.13
v1.14
v1.15
v1.16
v1.17
v1.18
v1.19
v1.19b
v1.19c
v1.2
v1.20
v1.21
v1.21b
v1.21c
v1.22
v1.22b
v1.22c
v1.3
v1.5
v1.6
v1.7
v1.8
v1.9

v2.*

v2.0
v2.0-rc1
v2.0-rc2
v2.0.0
v2.0.1
v2.1.1
v2.1.3
v2.1.4
v2.2.0
v2.2.1
v2.2.2
v2.2.3