Out-of-Bounds Read vulnerability in the SFTP server implementation of libssh, specifically within the sftp_handle() function. The flaw is due to an incorrect boundary check that permits the function to access memory beyond the valid handle list. This leads to the return of an invalid pointer, which is subsequently used in further processing. Although the issue requires authenticated access to the server, it can be exploited by a remote attacker with valid credentials to potentially read unintended memory regions, which could expose sensitive information or affect service behavior.
Hi, This is fixed in libssh-0.11.3. Can someone help to update the status? (e.g. Fixed In Version:)
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:18231 https://access.redhat.com/errata/RHSA-2025:18231
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:18275 https://access.redhat.com/errata/RHSA-2025:18275
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:18286 https://access.redhat.com/errata/RHSA-2025:18286
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:19012 https://access.redhat.com/errata/RHSA-2025:19012
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:19098 https://access.redhat.com/errata/RHSA-2025:19098
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions Red Hat Enterprise Linux 8.8 Telecommunications Update Service Via RHSA-2025:19101 https://access.redhat.com/errata/RHSA-2025:19101
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2025:19400 https://access.redhat.com/errata/RHSA-2025:19400
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On Via RHSA-2025:19401 https://access.redhat.com/errata/RHSA-2025:19401
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:19470 https://access.redhat.com/errata/RHSA-2025:19470
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:19472 https://access.redhat.com/errata/RHSA-2025:19472
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.20 Via RHSA-2025:19295 https://access.redhat.com/errata/RHSA-2025:19295
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.17 Via RHSA-2025:19313 https://access.redhat.com/errata/RHSA-2025:19313
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.19 Via RHSA-2025:19300 https://access.redhat.com/errata/RHSA-2025:19300
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:20943 https://access.redhat.com/errata/RHSA-2025:20943
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:21013 https://access.redhat.com/errata/RHSA-2025:21013
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.18 Via RHSA-2025:19864 https://access.redhat.com/errata/RHSA-2025:19864
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.14 Via RHSA-2025:21329 https://access.redhat.com/errata/RHSA-2025:21329