SUSE-SU-2025:20596-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-202520596-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:20596-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2025:20596-1
Upstream
Related
Published
2025-08-14T10:14:25Z
Modified
2026-03-23T04:50:52.646573Z
Summary
Security update for libssh
Details

This update for libssh fixes the following issues:

  • CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314)
  • CVE-2025-5987: Invalid return code for chacha20 poly1305 with OpenSSL backend (bsc#1245317)
  • CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309)
  • CVE-2025-4878: Use of uninitialized variable in privatekeyfromfile() (bsc#1245310)
  • CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311)
  • CVE-2025-5351: Double free in functions exporting keys (bsc#1245312)
References

Affected packages

SUSE:Linux Micro 6.1 / libssh

Package

Name
libssh
Purl
pkg:rpm/suse/libssh&distro=SUSE%20Linux%20Micro%206.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.10.6-slfo.1.1_2.1

Ecosystem specific

{
    "binaries": [
        {
            "libssh-config": "0.10.6-slfo.1.1_2.1",
            "libssh4": "0.10.6-slfo.1.1_2.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:20596-1.json"