CVE-2025-5318

A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

History

05 Nov 2025, 08:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:19295 -

03 Nov 2025, 13:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:19470 -
  • () https://access.redhat.com/errata/RHSA-2025:19472 -

03 Nov 2025, 05:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:19401 -

03 Nov 2025, 02:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:19400 -

29 Oct 2025, 14:13

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2025:18231 - () https://access.redhat.com/errata/RHSA-2025:18231 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2025:18275 - () https://access.redhat.com/errata/RHSA-2025:18275 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2025:18286 - () https://access.redhat.com/errata/RHSA-2025:18286 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2025:19012 - () https://access.redhat.com/errata/RHSA-2025:19012 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2025:19098 - () https://access.redhat.com/errata/RHSA-2025:19098 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2025:19101 - () https://access.redhat.com/errata/RHSA-2025:19101 - Third Party Advisory

27 Oct 2025, 09:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:19101 -

27 Oct 2025, 03:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:19098 -

23 Oct 2025, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:19012 -

20 Oct 2025, 08:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:18286 -

17 Oct 2025, 03:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:18275 -

16 Oct 2025, 11:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:18231 -

22 Sep 2025, 20:15

Type Values Removed Values Added
Summary (en) A flaw was found in the libssh library. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior. (en) A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.

21 Aug 2025, 01:10

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
First Time Libssh
Redhat
Redhat enterprise Linux
Libssh libssh
Redhat openshift Container Platform
References () https://access.redhat.com/security/cve/CVE-2025-5318 - () https://access.redhat.com/security/cve/CVE-2025-5318 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2369131 - () https://bugzilla.redhat.com/show_bug.cgi?id=2369131 - Issue Tracking, Third Party Advisory
References () https://www.libssh.org/security/advisories/CVE-2025-5318.txt - () https://www.libssh.org/security/advisories/CVE-2025-5318.txt - Vendor Advisory

26 Jun 2025, 18:58

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-24 14:15

Updated : 2025-11-05 08:15


NVD link : CVE-2025-5318

Mitre link : CVE-2025-5318

CVE.ORG link : CVE-2025-5318


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • openshift_container_platform

libssh

  • libssh
CWE
CWE-125

Out-of-bounds Read