OESA-2025-2129

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2129
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2129.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-2129
Upstream
Published
2025-09-05T12:42:09Z
Modified
2025-09-05T13:03:32.831059Z
Summary
libssh security update
Details

The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. With its Secure FTP implementation, you can play with remote files easily, without third-party programs others than libcrypto (from openssl).

Security Fix(es):

A vulnerability classified as critical was found in libssh up to 0.11.1.The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.As an impact it is known to affect confidentiality, integrity, and availability.Upgrading to version 0.11.2 eliminates this vulnerability.(CVE-2025-4877)

A vulnerability, which was classified as problematic, has been found in libssh up to 0.11.1.Using CWE to declare the problem leads to CWE-824. The product accesses or uses a pointer that has not been initialized.Impacted is confidentiality, integrity, and availability.Upgrading to version 0.11.2 eliminates this vulnerability.(CVE-2025-4878)

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.(CVE-2025-5372)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP3 / libssh

Package

Name
libssh
Purl
pkg:rpm/openEuler/libssh&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.6-11.oe2203sp3

Ecosystem specific

{
    "aarch64": [
        "libssh-0.9.6-11.oe2203sp3.aarch64.rpm",
        "libssh-debuginfo-0.9.6-11.oe2203sp3.aarch64.rpm",
        "libssh-debugsource-0.9.6-11.oe2203sp3.aarch64.rpm",
        "libssh-devel-0.9.6-11.oe2203sp3.aarch64.rpm"
    ],
    "x86_64": [
        "libssh-0.9.6-11.oe2203sp3.x86_64.rpm",
        "libssh-debuginfo-0.9.6-11.oe2203sp3.x86_64.rpm",
        "libssh-debugsource-0.9.6-11.oe2203sp3.x86_64.rpm",
        "libssh-devel-0.9.6-11.oe2203sp3.x86_64.rpm"
    ],
    "noarch": [
        "libssh-help-0.9.6-11.oe2203sp3.noarch.rpm"
    ],
    "src": [
        "libssh-0.9.6-11.oe2203sp3.src.rpm"
    ]
}