OESA-2025-2127

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2127
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2127.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-2127
Upstream
Published
2025-09-05T12:42:04Z
Modified
2025-09-05T13:03:31.869749Z
Summary
libssh security update
Details

The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. With its Secure FTP implementation, you can play with remote files easily, without third-party programs others than libcrypto (from openssl).

Security Fix(es):

A vulnerability classified as critical was found in libssh up to 0.11.1.The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.As an impact it is known to affect confidentiality, integrity, and availability.Upgrading to version 0.11.2 eliminates this vulnerability.(CVE-2025-4877)

A vulnerability, which was classified as problematic, has been found in libssh up to 0.11.1.Using CWE to declare the problem leads to CWE-824. The product accesses or uses a pointer that has not been initialized.Impacted is confidentiality, integrity, and availability.Upgrading to version 0.11.2 eliminates this vulnerability.(CVE-2025-4878)

A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.(CVE-2025-5351)

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.(CVE-2025-5372)

A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.(CVE-2025-5987)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP2 / libssh

Package

Name
libssh
Purl
pkg:rpm/openEuler/libssh&distro=openEuler-24.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.10.5-5.oe2403sp2

Ecosystem specific

{
    "noarch": [
        "libssh-help-0.10.5-5.oe2403sp2.noarch.rpm"
    ],
    "aarch64": [
        "libssh-0.10.5-5.oe2403sp2.aarch64.rpm",
        "libssh-debuginfo-0.10.5-5.oe2403sp2.aarch64.rpm",
        "libssh-debugsource-0.10.5-5.oe2403sp2.aarch64.rpm",
        "libssh-devel-0.10.5-5.oe2403sp2.aarch64.rpm"
    ],
    "src": [
        "libssh-0.10.5-5.oe2403sp2.src.rpm"
    ],
    "x86_64": [
        "libssh-0.10.5-5.oe2403sp2.x86_64.rpm",
        "libssh-debuginfo-0.10.5-5.oe2403sp2.x86_64.rpm",
        "libssh-debugsource-0.10.5-5.oe2403sp2.x86_64.rpm",
        "libssh-devel-0.10.5-5.oe2403sp2.x86_64.rpm"
    ]
}