GHSA-pwrf-jm93-99r3MediumCVSS 4.5
There's a vulnerability in the libssh package where when a libssh consumer passes in an...
🔗 CVE IDs covered (1)
📋 Description
There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption.
This issue affects only 32-bits builds of libssh.
🔗 References (7)
- https://nvd.nist.gov/vuln/detail/CVE-2025-4877
- https://access.redhat.com/security/cve/CVE-2025-4877
- https://bugzilla.redhat.com/show_bug.cgi?id=2376193
- https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=6fd9cc8ce3958092a1aae11f1f2e911b2747732d
- https://www.libssh.org/security/advisories/CVE-2025-4877.txt
- https://access.redhat.com/errata/RHSA-2026:18683
- https://github.com/advisories/GHSA-pwrf-jm93-99r3