Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-5449 (GCVE-0-2025-5449)
Vulnerability from cvelistv5 – Published: 2025-07-25 17:19 – Updated: 2026-01-08 03:11- CWE-190 - Integer Overflow or Wraparound
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Affected:
0.11.0 , ≤ 0.11.1
(semver)
|
||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-5449",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-25T17:33:59.050638Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-25T17:34:41.318Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://www.libssh.org",
"defaultStatus": "unaffected",
"packageName": "libssh",
"versions": [
{
"lessThanOrEqual": "0.11.1",
"status": "affected",
"version": "0.11.0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "libssh",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unaffected",
"packageName": "libssh2",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "unaffected",
"packageName": "libssh2",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "libssh",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "unaffected",
"packageName": "libssh",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "unaffected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Ronald Crane for reporting this issue."
}
],
"datePublic": "2025-06-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "Integer Overflow or Wraparound",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T03:11:05.447Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-5449"
},
{
"name": "RHBZ#2369705",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369705"
},
{
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=261612179f740bc62ba363d98b3bd5e5573a811f"
},
{
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=3443aec90188d6aab9282afc80a81df5ab72c4da"
},
{
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=5504ff40515439a5fecbb17da7483000c4d12eb7"
},
{
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=78485f446af9b30e37eb8f177b81940710d54496"
},
{
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb"
},
{
"url": "https://www.libssh.org/security/advisories/CVE-2025-5449.txt"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-06-02T06:50:26.935Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-06-24T00:00:00.000Z",
"value": "Made public."
}
],
"title": "Libssh: integer overflow in libssh sftp server packet length validation leading to denial of service",
"workarounds": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-190: Integer Overflow or Wraparound"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-5449",
"datePublished": "2025-07-25T17:19:39.345Z",
"dateReserved": "2025-06-02T07:10:17.845Z",
"dateUpdated": "2026-01-08T03:11:05.447Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-5449\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-07-25T18:15:26.967\",\"lastModified\":\"2026-01-08T04:15:55.020\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 una falla en la l\u00f3gica de decodificaci\u00f3n de mensajes del servidor SFTP de libssh. El problema se debe a una comprobaci\u00f3n incorrecta de la longitud del paquete, lo que permite un desbordamiento de enteros al gestionar payloads de gran tama\u00f1o en sistemas de 32 bits. Este problema provoca errores en la asignaci\u00f3n de memoria y el bloqueo del proceso del servidor, lo que resulta en una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libssh:libssh:0.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57396877-0D7A-4506-8C21-38EC7DFB3F04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libssh:libssh:0.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C4817DC-731C-4EA3-BF8A-FCCE4AB8AF87\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-5449\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2369705\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=261612179f740bc62ba363d98b3bd5e5573a811f\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=3443aec90188d6aab9282afc80a81df5ab72c4da\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=5504ff40515439a5fecbb17da7483000c4d12eb7\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=78485f446af9b30e37eb8f177b81940710d54496\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://www.libssh.org/security/advisories/CVE-2025-5449.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-5449\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-25T17:33:59.050638Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-25T17:34:02.421Z\"}}], \"cna\": {\"title\": \"Libssh: integer overflow in libssh sftp server packet length validation leading to denial of service\", \"credits\": [{\"lang\": \"en\", \"value\": \"Red Hat would like to thank Ronald Crane for reporting this issue.\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"0.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"0.11.1\"}], \"packageName\": \"libssh\", \"collectionURL\": \"https://www.libssh.org\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"libssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"libssh2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"libssh2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"libssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"libssh\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-06-02T06:50:26.935Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-06-24T00:00:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-06-24T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/security/cve/CVE-2025-5449\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2369705\", \"name\": \"RHBZ#2369705\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=261612179f740bc62ba363d98b3bd5e5573a811f\"}, {\"url\": \"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=3443aec90188d6aab9282afc80a81df5ab72c4da\"}, {\"url\": \"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=5504ff40515439a5fecbb17da7483000c4d12eb7\"}, {\"url\": \"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=78485f446af9b30e37eb8f177b81940710d54496\"}, {\"url\": \"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb\"}, {\"url\": \"https://www.libssh.org/security/advisories/CVE-2025-5449.txt\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-190\", \"description\": \"Integer Overflow or Wraparound\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-01-08T03:11:05.447Z\"}, \"x_redhatCweChain\": \"CWE-190: Integer Overflow or Wraparound\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-5449\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-08T03:11:05.447Z\", \"dateReserved\": \"2025-06-02T07:10:17.845Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-07-25T17:19:39.345Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
BDU:2025-07645
Vulnerability from fstec - Published: 22.04.2025{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Novell Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Canonical Ltd.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (openSUSE Tumbleweed), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10), 25.04 (Ubuntu), \u0434\u043e 0.11.2 (libssh), 13 (Debian GNU/Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\n\u0414\u043b\u044f libssh:\nhttps://www.libssh.org/security/advisories/CVE-2025-5449.txt\nhttps://git.libssh.org/projects/libssh.git/commit/?id=261612179f740bc62ba363d98b3bd5e5573a811f\nhttps://git.libssh.org/projects/libssh.git/commit/?id=3443aec90188d6aab9282afc80a81df5ab72c4da\nhttps://git.libssh.org/projects/libssh.git/commit/?id=78485f446af9b30e37eb8f177b81940710d54496\nhttps://git.libssh.org/projects/libssh.git/commit/?id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb\nhttps://git.libssh.org/projects/libssh.git/commit/?id=5504ff40515439a5fecbb17da7483000c4d12eb7\n\n\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u041b\u042c\u0422 \u0421\u041f 10: \n\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430:\nhttps://altsp.su/obnovleniya-bezopasnosti/\n\n\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: \n\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2025-5449\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/CVE-2025-5449\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2025-5449.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "22.04.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "01.10.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "27.06.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-07645",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-5449",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "openSUSE Tumbleweed, Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u041b\u042c\u0422 \u0421\u041f 10, Ubuntu, libssh",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Novell Inc. openSUSE Tumbleweed - , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - , Canonical Ltd. Ubuntu 25.04 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 13 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 sftp_decode_channel_data_to_packet() \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 libssh, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119), \u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125), \u0426\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0438\u043b\u0438 \u0446\u0438\u043a\u043b\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0441\u0434\u0432\u0438\u0433 (CWE-190)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 sftp_decode_channel_data_to_packet() \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 libssh \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "\u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u043e\u0439 x32.",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2025\u0026m=slackware-security.392586\nhttps://www.libssh.org/security/advisories/CVE-2025-5449.txt\nhttps://git.libssh.org/projects/libssh.git/commit/?id=261612179f740bc62ba363d98b3bd5e5573a811f\nhttps://git.libssh.org/projects/libssh.git/commit/?id=3443aec90188d6aab9282afc80a81df5ab72c4da\nhttps://git.libssh.org/projects/libssh.git/commit/?id=78485f446af9b30e37eb8f177b81940710d54496\nhttps://git.libssh.org/projects/libssh.git/commit/?id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb\nhttps://git.libssh.org/projects/libssh.git/commit/?id=5504ff40515439a5fecbb17da7483000c4d12eb7\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://security-tracker.debian.org/tracker/CVE-2025-5449\nhttps://ubuntu.com/security/CVE-2025-5449\nhttps://www.suse.com/security/cve/CVE-2025-5449.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119, CWE-125, CWE-190",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,3)"
}
OPENSUSE-SU-2025:15243-1
Vulnerability from csaf_opensuse - Published: 2025-07-03 00:00 - Updated: 2025-07-03 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libssh-config-0.11.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libssh-config-0.11.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15243",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15243-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4877 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4877/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4878 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5318 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5351 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5372 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5449 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5987 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5987/"
}
],
"title": "libssh-config-0.11.2-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15243-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libssh-config-0.11.2-1.1.aarch64",
"product": {
"name": "libssh-config-0.11.2-1.1.aarch64",
"product_id": "libssh-config-0.11.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libssh-devel-0.11.2-1.1.aarch64",
"product": {
"name": "libssh-devel-0.11.2-1.1.aarch64",
"product_id": "libssh-devel-0.11.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libssh4-0.11.2-1.1.aarch64",
"product": {
"name": "libssh4-0.11.2-1.1.aarch64",
"product_id": "libssh4-0.11.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libssh4-32bit-0.11.2-1.1.aarch64",
"product": {
"name": "libssh4-32bit-0.11.2-1.1.aarch64",
"product_id": "libssh4-32bit-0.11.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libssh-config-0.11.2-1.1.ppc64le",
"product": {
"name": "libssh-config-0.11.2-1.1.ppc64le",
"product_id": "libssh-config-0.11.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libssh-devel-0.11.2-1.1.ppc64le",
"product": {
"name": "libssh-devel-0.11.2-1.1.ppc64le",
"product_id": "libssh-devel-0.11.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libssh4-0.11.2-1.1.ppc64le",
"product": {
"name": "libssh4-0.11.2-1.1.ppc64le",
"product_id": "libssh4-0.11.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libssh4-32bit-0.11.2-1.1.ppc64le",
"product": {
"name": "libssh4-32bit-0.11.2-1.1.ppc64le",
"product_id": "libssh4-32bit-0.11.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libssh-config-0.11.2-1.1.s390x",
"product": {
"name": "libssh-config-0.11.2-1.1.s390x",
"product_id": "libssh-config-0.11.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libssh-devel-0.11.2-1.1.s390x",
"product": {
"name": "libssh-devel-0.11.2-1.1.s390x",
"product_id": "libssh-devel-0.11.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libssh4-0.11.2-1.1.s390x",
"product": {
"name": "libssh4-0.11.2-1.1.s390x",
"product_id": "libssh4-0.11.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libssh4-32bit-0.11.2-1.1.s390x",
"product": {
"name": "libssh4-32bit-0.11.2-1.1.s390x",
"product_id": "libssh4-32bit-0.11.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libssh-config-0.11.2-1.1.x86_64",
"product": {
"name": "libssh-config-0.11.2-1.1.x86_64",
"product_id": "libssh-config-0.11.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libssh-devel-0.11.2-1.1.x86_64",
"product": {
"name": "libssh-devel-0.11.2-1.1.x86_64",
"product_id": "libssh-devel-0.11.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libssh4-0.11.2-1.1.x86_64",
"product": {
"name": "libssh4-0.11.2-1.1.x86_64",
"product_id": "libssh4-0.11.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libssh4-32bit-0.11.2-1.1.x86_64",
"product": {
"name": "libssh4-32bit-0.11.2-1.1.x86_64",
"product_id": "libssh4-32bit-0.11.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh-config-0.11.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64"
},
"product_reference": "libssh-config-0.11.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh-config-0.11.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le"
},
"product_reference": "libssh-config-0.11.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh-config-0.11.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x"
},
"product_reference": "libssh-config-0.11.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh-config-0.11.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64"
},
"product_reference": "libssh-config-0.11.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh-devel-0.11.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64"
},
"product_reference": "libssh-devel-0.11.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh-devel-0.11.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le"
},
"product_reference": "libssh-devel-0.11.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh-devel-0.11.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x"
},
"product_reference": "libssh-devel-0.11.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh-devel-0.11.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64"
},
"product_reference": "libssh-devel-0.11.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh4-0.11.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64"
},
"product_reference": "libssh4-0.11.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh4-0.11.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le"
},
"product_reference": "libssh4-0.11.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh4-0.11.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x"
},
"product_reference": "libssh4-0.11.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh4-0.11.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64"
},
"product_reference": "libssh4-0.11.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh4-32bit-0.11.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64"
},
"product_reference": "libssh4-32bit-0.11.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh4-32bit-0.11.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le"
},
"product_reference": "libssh4-32bit-0.11.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh4-32bit-0.11.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x"
},
"product_reference": "libssh4-32bit-0.11.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libssh4-32bit-0.11.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
},
"product_reference": "libssh4-32bit-0.11.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4877",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4877"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4877",
"url": "https://www.suse.com/security/cve/CVE-2025-4877"
},
{
"category": "external",
"summary": "SUSE Bug 1245309 for CVE-2025-4877",
"url": "https://bugzilla.suse.com/1245309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-4877"
},
{
"cve": "CVE-2025-4878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4878"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4878",
"url": "https://www.suse.com/security/cve/CVE-2025-4878"
},
{
"category": "external",
"summary": "SUSE Bug 1245310 for CVE-2025-4878",
"url": "https://bugzilla.suse.com/1245310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-4878"
},
{
"cve": "CVE-2025-5318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5318"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5318",
"url": "https://www.suse.com/security/cve/CVE-2025-5318"
},
{
"category": "external",
"summary": "SUSE Bug 1245311 for CVE-2025-5318",
"url": "https://bugzilla.suse.com/1245311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-5318"
},
{
"cve": "CVE-2025-5351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5351"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5351",
"url": "https://www.suse.com/security/cve/CVE-2025-5351"
},
{
"category": "external",
"summary": "SUSE Bug 1245312 for CVE-2025-5351",
"url": "https://bugzilla.suse.com/1245312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-5351"
},
{
"cve": "CVE-2025-5372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5372"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5372",
"url": "https://www.suse.com/security/cve/CVE-2025-5372"
},
{
"category": "external",
"summary": "SUSE Bug 1245314 for CVE-2025-5372",
"url": "https://bugzilla.suse.com/1245314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-5372"
},
{
"cve": "CVE-2025-5449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5449"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5449",
"url": "https://www.suse.com/security/cve/CVE-2025-5449"
},
{
"category": "external",
"summary": "SUSE Bug 1245316 for CVE-2025-5449",
"url": "https://bugzilla.suse.com/1245316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-5449"
},
{
"cve": "CVE-2025-5987",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5987"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5987",
"url": "https://www.suse.com/security/cve/CVE-2025-5987"
},
{
"category": "external",
"summary": "SUSE Bug 1245317 for CVE-2025-5987",
"url": "https://bugzilla.suse.com/1245317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-config-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh-devel-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-0.11.2-1.1.x86_64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.aarch64",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.ppc64le",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.s390x",
"openSUSE Tumbleweed:libssh4-32bit-0.11.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-5987"
}
]
}
CERTFR-2025-AVI-0907
Vulnerability from certfr_avis - Published: 2025-10-22 - Updated: 2025-10-22
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 8.4.0 à 8.4.3 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Cluster version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 9.0.0 à 9.1.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 8.0.0 à 8.0.40 | ||
| Oracle | MySQL | MySQL Cluster version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Workbench version 8.0.0 à 8.0.43 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server (Server: Optimizer) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.0 \u00e0 8.4.3",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.0.0 \u00e0 9.1.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.0 \u00e0 8.0.40",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-5449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5449"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-53067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53067"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5399"
}
],
"initial_release_date": "2025-10-22T00:00:00",
"last_revision_date": "2025-10-22T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0907",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2025",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
}
]
}
CERTFR-2025-AVI-0907
Vulnerability from certfr_avis - Published: 2025-10-22 - Updated: 2025-10-22
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 8.4.0 à 8.4.3 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Cluster version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 9.0.0 à 9.1.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 8.0.0 à 8.0.40 | ||
| Oracle | MySQL | MySQL Cluster version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Workbench version 8.0.0 à 8.0.43 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server (Server: Optimizer) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.0 \u00e0 8.4.3",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.0.0 \u00e0 9.1.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.0 \u00e0 8.0.40",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-5449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5449"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-53067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53067"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5399"
}
],
"initial_release_date": "2025-10-22T00:00:00",
"last_revision_date": "2025-10-22T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0907",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2025",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
}
]
}
GHSA-Q9X7-4RF7-4XQ2
Vulnerability from github – Published: 2025-07-25 18:30 – Updated: 2025-07-25 18:30A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
{
"affected": [],
"aliases": [
"CVE-2025-5449"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-25T18:15:26Z",
"severity": "MODERATE"
},
"details": "A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.",
"id": "GHSA-q9x7-4rf7-4xq2",
"modified": "2025-07-25T18:30:41Z",
"published": "2025-07-25T18:30:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5449"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-5449"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369705"
},
{
"type": "WEB",
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=261612179f740bc62ba363d98b3bd5e5573a811f"
},
{
"type": "WEB",
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=3443aec90188d6aab9282afc80a81df5ab72c4da"
},
{
"type": "WEB",
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=5504ff40515439a5fecbb17da7483000c4d12eb7"
},
{
"type": "WEB",
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=78485f446af9b30e37eb8f177b81940710d54496"
},
{
"type": "WEB",
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb"
},
{
"type": "WEB",
"url": "https://www.libssh.org/security/advisories/CVE-2025-5449.txt"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-5449
Vulnerability from fkie_nvd - Published: 2025-07-25 18:15 - Updated: 2026-01-08 04:156.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2025-5449 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2369705 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=261612179f740bc62ba363d98b3bd5e5573a811f | Patch | |
| secalert@redhat.com | https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=3443aec90188d6aab9282afc80a81df5ab72c4da | Patch | |
| secalert@redhat.com | https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=5504ff40515439a5fecbb17da7483000c4d12eb7 | Patch | |
| secalert@redhat.com | https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=78485f446af9b30e37eb8f177b81940710d54496 | Patch | |
| secalert@redhat.com | https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb | Patch | |
| secalert@redhat.com | https://www.libssh.org/security/advisories/CVE-2025-5449.txt | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libssh:libssh:0.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57396877-0D7A-4506-8C21-38EC7DFB3F04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libssh:libssh:0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C4817DC-731C-4EA3-BF8A-FCCE4AB8AF87",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service."
},
{
"lang": "es",
"value": "Se detect\u00f3 una falla en la l\u00f3gica de decodificaci\u00f3n de mensajes del servidor SFTP de libssh. El problema se debe a una comprobaci\u00f3n incorrecta de la longitud del paquete, lo que permite un desbordamiento de enteros al gestionar payloads de gran tama\u00f1o en sistemas de 32 bits. Este problema provoca errores en la asignaci\u00f3n de memoria y el bloqueo del proceso del servidor, lo que resulta en una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2025-5449",
"lastModified": "2026-01-08T04:15:55.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
},
"published": "2025-07-25T18:15:26.967",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-5449"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369705"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=261612179f740bc62ba363d98b3bd5e5573a811f"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=3443aec90188d6aab9282afc80a81df5ab72c4da"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=5504ff40515439a5fecbb17da7483000c4d12eb7"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=78485f446af9b30e37eb8f177b81940710d54496"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11\u0026id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.libssh.org/security/advisories/CVE-2025-5449.txt"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
WID-SEC-W-2025-1423
Vulnerability from csaf_certbund - Published: 2025-06-29 22:00 - Updated: 2026-02-04 23:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libssh ist eine C Bibliothek f\u00fcr das Anbieten von SSH Diensten auf Client- und Serverseite. Sie kann genutzt werden, um aus der Ferne Programme auszuf\u00fchren, Dateien zu \u00fcbertragen oder als sicherer und transparenter Tunnel f\u00fcr entfernte Programme genutzt werden.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in libssh ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, um Sicherheitsvorkehrungen zu umgehen, und potentiell weitere nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1423 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1423.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1423 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1423"
},
{
"category": "external",
"summary": "libssh. org vom 2025-06-29",
"url": "https://www.libssh.org/2025/06/24/libssh-0-11-2-security-and-bugfix-release/"
},
{
"category": "external",
"summary": "libssh security and bugfix release vom 2025-06-29",
"url": "https://seclists.org/oss-sec/2025/q2/284"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02229-1 vom 2025-07-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021759.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7619-1 vom 2025-07-07",
"url": "https://ubuntu.com/security/notices/USN-7619-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02281-1 vom 2025-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021789.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02279-1 vom 2025-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021791.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02278-1 vom 2025-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021792.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-18E8506D3A vom 2025-07-22",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-18e8506d3a"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02755-1 vom 2025-08-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022132.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7696-1 vom 2025-08-19",
"url": "https://ubuntu.com/security/notices/USN-7696-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20557-1 vom 2025-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022231.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20596-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022366.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7246875 vom 2025-10-01",
"url": "https://www.ibm.com/support/pages/node/7246875"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18231 vom 2025-10-16",
"url": "https://access.redhat.com/errata/RHSA-2025:18231"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-18275 vom 2025-10-17",
"url": "https://linux.oracle.com/errata/ELSA-2025-18275.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:18275 vom 2025-10-18",
"url": "https://errata.build.resf.org/RLSA-2025:18275"
},
{
"category": "external",
"summary": "RedHat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2025:18286"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:18231 vom 2025-10-18",
"url": "https://errata.build.resf.org/RLSA-2025:18231"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19401 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19401"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19400 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19400"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19470 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19470"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19472 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19472"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19300 vom 2025-11-05",
"url": "https://access.redhat.com/errata/RHSA-2025:19300"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19313 vom 2025-11-05",
"url": "https://access.redhat.com/errata/RHSA-2025:19313"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19807 vom 2025-11-08",
"url": "https://access.redhat.com/errata/RHSA-2025:19807"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21013 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:21013"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20943 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20943"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21977 vom 2025-11-24",
"url": "https://access.redhat.com/errata/RHSA-2025:21977"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:21977 vom 2025-11-25",
"url": "https://errata.build.resf.org/RLSA-2025:21977"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21977 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-21977.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21829 vom 2025-11-27",
"url": "https://access.redhat.com/errata/RHSA-2025:21829"
},
{
"category": "external",
"summary": "Meinberg Security Advisory MBGSA-2025.05 vom 2025-11-27",
"url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2025-05-lantime-firmware-v7-08-025.htm"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:18286 vom 2025-11-28",
"url": "https://errata.build.resf.org/RLSA-2025:18286"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20251128-0005 vom 2025-11-28",
"url": "https://security.netapp.com/advisory/NTAP-20251128-0005"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21013 vom 2025-12-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-21013.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23024 vom 2025-12-10",
"url": "https://access.redhat.com/errata/RHSA-2025:23024"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23484 vom 2025-12-18",
"url": "https://access.redhat.com/errata/RHSA-2025:23484"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7255154 vom 2025-12-17",
"url": "https://www.ibm.com/support/pages/node/7255154"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23484 vom 2025-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-23484.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:23484 vom 2025-12-18",
"url": "https://errata.build.resf.org/RLSA-2025:23484"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23483 vom 2025-12-18",
"url": "https://access.redhat.com/errata/RHSA-2025:23483"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23483 vom 2025-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-23483.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:23483 vom 2025-12-19",
"url": "https://errata.build.resf.org/RLSA-2025:23483"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7256201 vom 2026-01-05",
"url": "https://www.ibm.com/support/pages/node/7256201"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0431 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0431"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0428 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0428"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0430 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0430"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0427 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0427"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0934 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0934"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0950 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0950"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0702 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0702"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0978 vom 2026-01-27",
"url": "https://access.redhat.com/errata/RHSA-2026:0978"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0996 vom 2026-01-30",
"url": "https://access.redhat.com/errata/RHSA-2026:0996"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0985 vom 2026-01-30",
"url": "https://access.redhat.com/errata/RHSA-2026:0985"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0980 vom 2026-02-03",
"url": "https://access.redhat.com/errata/RHSA-2026:0980"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1539 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1539"
}
],
"source_lang": "en-US",
"title": "libssh: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-04T23:00:00.000+00:00",
"generator": {
"date": "2026-02-05T10:00:31.809+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1423",
"initial_release_date": "2025-06-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-07T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "6",
"summary": "Referenz(en) aufgenommen: EUVD-2025-22335"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-05T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "21",
"summary": "doppelter Eintrag entfernt"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Meinberg aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat, IBM und Oracle Linux aufgenommen"
},
{
"date": "2025-12-18T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-04T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "36"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.16.0",
"product": {
"name": "IBM App Connect Enterprise \u003c12.16.0",
"product_id": "T047348"
}
},
{
"category": "product_version",
"name": "12.16.0",
"product": {
"name": "IBM App Connect Enterprise 12.16.0",
"product_id": "T047348-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:12.16.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c12.0.16",
"product": {
"name": "IBM App Connect Enterprise \u003c12.0.16",
"product_id": "T047349"
}
},
{
"category": "product_version",
"name": "12.0.16",
"product": {
"name": "IBM App Connect Enterprise 12.0.16",
"product_id": "T047349-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.16"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF03",
"product_id": "T049499"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF03",
"product_id": "T049499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if03"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.9.1",
"product": {
"name": "IBM Security Verify Access \u003c10.0.9.1",
"product_id": "T049459"
}
},
{
"category": "product_version",
"name": "10.0.9.1",
"product": {
"name": "IBM Security Verify Access 10.0.9.1",
"product_id": "T049459-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_verify_access:v10.0.9.1"
}
}
}
],
"category": "product_name",
"name": "Security Verify Access"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.08.025",
"product": {
"name": "Meinberg LANTIME \u003c7.08.025",
"product_id": "T048944"
}
},
{
"category": "product_version",
"name": "7.08.025",
"product": {
"name": "Meinberg LANTIME 7.08.025",
"product_id": "T048944-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:meinberg:lantime:7.08.025"
}
}
}
],
"category": "product_name",
"name": "LANTIME"
}
],
"category": "vendor",
"name": "Meinberg"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Baseboard Management Controller",
"product": {
"name": "NetApp AFF Baseboard Management Controller",
"product_id": "T025086",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:aff:::baseboard_management_controller"
}
}
}
],
"category": "product_name",
"name": "AFF"
},
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
},
{
"branches": [
{
"category": "product_version",
"name": "Baseboard Management Controller",
"product": {
"name": "NetApp FAS Baseboard Management Controller",
"product_id": "T043535",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:baseboard_management_controller"
}
}
}
],
"category": "product_name",
"name": "FAS"
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c0.11.2",
"product": {
"name": "Open Source libssh \u003c0.11.2",
"product_id": "T044955"
}
},
{
"category": "product_version",
"name": "0.11.2",
"product": {
"name": "Open Source libssh 0.11.2",
"product_id": "T044955-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:libssh:libssh:0.11.2"
}
}
}
],
"category": "product_name",
"name": "libssh"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T037727",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.17.43",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.17.43",
"product_id": "T048318"
}
},
{
"category": "product_version",
"name": "Container Platform 4.17.43",
"product": {
"name": "Red Hat OpenShift Container Platform 4.17.43",
"product_id": "T048318-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.17.43"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.20.12",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.20.12",
"product_id": "T050329"
}
},
{
"category": "product_version",
"name": "Container Platform 4.20.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.20.12",
"product_id": "T050329-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.20.12"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4877",
"product_status": {
"known_affected": [
"T037727",
"T025086",
"T025152",
"67646",
"T004914",
"T032255",
"74185",
"T039664",
"T048318",
"T047348",
"T048944",
"T047349",
"T002207",
"T043535",
"T044955",
"T000126",
"T050329",
"T049499",
"T049459",
"T048226",
"T048301"
]
},
"release_date": "2025-06-29T22:00:00.000+00:00",
"title": "CVE-2025-4877"
},
{
"cve": "CVE-2025-5351",
"product_status": {
"known_affected": [
"T037727",
"T025086",
"T025152",
"67646",
"T004914",
"T032255",
"74185",
"T039664",
"T048318",
"T047348",
"T048944",
"T047349",
"T002207",
"T043535",
"T044955",
"T000126",
"T050329",
"T049499",
"T049459",
"T048226",
"T048301"
]
},
"release_date": "2025-06-29T22:00:00.000+00:00",
"title": "CVE-2025-5351"
},
{
"cve": "CVE-2025-5449",
"product_status": {
"known_affected": [
"T037727",
"T025086",
"T025152",
"67646",
"T004914",
"T032255",
"74185",
"T039664",
"T048318",
"T047348",
"T048944",
"T047349",
"T002207",
"T043535",
"T044955",
"T000126",
"T050329",
"T049499",
"T049459",
"T048226",
"T048301"
]
},
"release_date": "2025-06-29T22:00:00.000+00:00",
"title": "CVE-2025-5449"
},
{
"cve": "CVE-2025-4878",
"product_status": {
"known_affected": [
"T037727",
"T025086",
"T025152",
"67646",
"T004914",
"T032255",
"74185",
"T039664",
"T048318",
"T047348",
"T048944",
"T047349",
"T002207",
"T043535",
"T044955",
"T000126",
"T050329",
"T049499",
"T049459",
"T048226",
"T048301"
]
},
"release_date": "2025-06-29T22:00:00.000+00:00",
"title": "CVE-2025-4878"
},
{
"cve": "CVE-2025-5318",
"product_status": {
"known_affected": [
"T037727",
"T025086",
"T025152",
"67646",
"T004914",
"T032255",
"74185",
"T039664",
"T048318",
"T047348",
"T048944",
"T047349",
"T002207",
"T043535",
"T044955",
"T000126",
"T050329",
"T049499",
"T049459",
"T048226",
"T048301"
]
},
"release_date": "2025-06-29T22:00:00.000+00:00",
"title": "CVE-2025-5318"
},
{
"cve": "CVE-2025-5372",
"product_status": {
"known_affected": [
"T037727",
"T025086",
"T025152",
"67646",
"T004914",
"T032255",
"74185",
"T039664",
"T048318",
"T047348",
"T048944",
"T047349",
"T002207",
"T043535",
"T044955",
"T000126",
"T050329",
"T049499",
"T049459",
"T048226",
"T048301"
]
},
"release_date": "2025-06-29T22:00:00.000+00:00",
"title": "CVE-2025-5372"
},
{
"cve": "CVE-2025-5987",
"product_status": {
"known_affected": [
"T037727",
"T025086",
"T025152",
"67646",
"T004914",
"T032255",
"74185",
"T039664",
"T048318",
"T047348",
"T048944",
"T047349",
"T002207",
"T043535",
"T044955",
"T000126",
"T050329",
"T049499",
"T049459",
"T048226",
"T048301"
]
},
"release_date": "2025-06-29T22:00:00.000+00:00",
"title": "CVE-2025-5987"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.