{"schema_version":"1.7.2","id":"OESA-2025-2130","modified":"2025-09-05T12:42:12Z","published":"2025-09-05T12:42:12Z","upstream":["CVE-2025-4877","CVE-2025-4878","CVE-2025-5372"],"summary":"libssh security update","details":"The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. With its Secure FTP implementation, you can play with remote files easily, without third-party programs others than libcrypto (from openssl).\r\n\r\nSecurity Fix(es):\n\nA vulnerability classified as critical was found in libssh up to 0.11.1.The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.As an impact it is known to affect confidentiality, integrity, and availability.Upgrading to version 0.11.2 eliminates this vulnerability.(CVE-2025-4877)\n\nA vulnerability, which was classified as problematic, has been found in libssh up to 0.11.1.Using CWE to declare the problem leads to CWE-824. The product accesses or uses a pointer that has not been initialized.Impacted is confidentiality, integrity, and availability.Upgrading to version 0.11.2 eliminates this vulnerability.(CVE-2025-4878)\n\nA flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions&apos; confidentiality, integrity, and availability.(CVE-2025-5372)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"libssh","purl":"pkg:rpm/openEuler/libssh&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.6-11.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["libssh-0.9.6-11.oe2203sp4.aarch64.rpm","libssh-debuginfo-0.9.6-11.oe2203sp4.aarch64.rpm","libssh-debugsource-0.9.6-11.oe2203sp4.aarch64.rpm","libssh-devel-0.9.6-11.oe2203sp4.aarch64.rpm"],"noarch":["libssh-help-0.9.6-11.oe2203sp4.noarch.rpm"],"src":["libssh-0.9.6-11.oe2203sp4.src.rpm"],"x86_64":["libssh-0.9.6-11.oe2203sp4.x86_64.rpm","libssh-debuginfo-0.9.6-11.oe2203sp4.x86_64.rpm","libssh-debugsource-0.9.6-11.oe2203sp4.x86_64.rpm","libssh-devel-0.9.6-11.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2130"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-4877"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-4878"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5372"}],"database_specific":{"severity":"High"}}
