File _patchinfo of Package patchinfo.39451
<patchinfo incident="39451"> <issue tracker="cve" id="2025-5372"/> <issue tracker="cve" id="2025-5318"/> <issue tracker="cve" id="2025-4878"/> <issue tracker="cve" id="2025-4877"/> <issue tracker="bnc" id="1245314">VUL-0: CVE-2025-5372: libssh,libssh2_org: ssh_kdf() returns a success code on certain failures</issue> <issue tracker="bnc" id="1245309">VUL-0: CVE-2025-4877: libssh,libssh2_org: Write beyond bounds in binary to base64 conversion functions</issue> <issue tracker="bnc" id="1245310">VUL-0: CVE-2025-4878: libssh,libssh2_org: Use of uninitialized variable in privatekey_from_file()</issue> <issue tracker="bnc" id="1245311">VUL-0: CVE-2025-5318: libssh,libssh2_org: Likely read beyond bounds in sftp server handle management</issue> <packager>lmulling</packager> <rating>important</rating> <category>security</category> <summary>Security update for libssh</summary> <description>This update for libssh fixes the following issues: - CVE-2025-4877: Fixed write beyond bounds in binary to base64 conversion functions (bsc#1245309). - CVE-2025-4878: Fixed use of uninitialized variable in privatekey_from_file() (bsc#1245310). - CVE-2025-5318: Fixed likely read beyond bounds in sftp server handle management (bsc#1245311). - CVE-2025-5372: Fixed ssh_kdf() returns a success code on certain failures (bsc#1245314). </description> </patchinfo>