{
  "threat_severity" : "Moderate",
  "public_date" : "2025-04-26T00:00:00Z",
  "bugzilla" : {
    "description" : "libssh: Invalid return code for chacha20 poly1305 with OpenSSL backend",
    "id" : "2376219",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2376219"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.1",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-393",
  "details" : [ "A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.", "A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes." ],
  "statement" : "Red Hat Product Security Team has rated this vulnerability as having a Moderate security impact. This is due to the high complexity in exploiting this flaw. For a successful attack to take place an attacker needs to manage to exhaust the heap space to for the OpenSSL library to return the error code which wrongly match the SSH_OK return code.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2025-12-17T00:00:00Z",
    "advisory" : "RHSA-2025:23484",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "libssh-0:0.11.1-5.el10_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10.0 Extended Update Support",
    "release_date" : "2026-01-12T00:00:00Z",
    "advisory" : "RHSA-2026:0427",
    "cpe" : "cpe:/o:redhat:enterprise_linux_eus:10.0",
    "package" : "libssh-0:0.11.1-4.el10_0.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-12-18T00:00:00Z",
    "advisory" : "RHSA-2025:23483",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "libssh-0:0.10.4-17.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-12-18T00:00:00Z",
    "advisory" : "RHSA-2025:23483",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "libssh-0:0.10.4-17.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
    "release_date" : "2026-01-12T00:00:00Z",
    "advisory" : "RHSA-2026:0430",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.2",
    "package" : "libssh-0:0.10.4-9.el9_2.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2026-01-12T00:00:00Z",
    "advisory" : "RHSA-2026:0431",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "libssh-0:0.10.4-13.el9_4.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.6 Extended Update Support",
    "release_date" : "2026-01-12T00:00:00Z",
    "advisory" : "RHSA-2026:0428",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.6",
    "package" : "libssh-0:0.10.4-15.el9_6.1"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.13",
    "release_date" : "2026-03-05T00:00:00Z",
    "advisory" : "RHSA-2026:3415",
    "cpe" : "cpe:/a:redhat:openshift:4.13::el9",
    "package" : "rhcos-413.92.202602240113-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.14",
    "release_date" : "2026-01-30T00:00:00Z",
    "advisory" : "RHSA-2026:0996",
    "cpe" : "cpe:/a:redhat:openshift:4.14::el9",
    "package" : "rhcos-414.92.202601191325-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.15",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:1541",
    "cpe" : "cpe:/a:redhat:openshift:4.15::el9",
    "package" : "rhcos-415.92.202601271320-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.16",
    "release_date" : "2026-01-30T00:00:00Z",
    "advisory" : "RHSA-2026:0985",
    "cpe" : "cpe:/a:redhat:openshift:4.16::el9",
    "package" : "rhcos-416.94.202601160124-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.17",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0702",
    "cpe" : "cpe:/a:redhat:openshift:4.17::el9",
    "package" : "rhcos-417.94.202601120213-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.18",
    "release_date" : "2026-02-03T00:00:00Z",
    "advisory" : "RHSA-2026:0980",
    "cpe" : "cpe:/a:redhat:openshift:4.18::el9",
    "package" : "rhcos-418.94.202601202224-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.19",
    "release_date" : "2026-02-04T00:00:00Z",
    "advisory" : "RHSA-2026:1539",
    "cpe" : "cpe:/a:redhat:openshift:4.19::el9",
    "package" : "rhcos-4.19.9.6.202601260820-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.20",
    "release_date" : "2026-01-27T00:00:00Z",
    "advisory" : "RHSA-2026:0978",
    "cpe" : "cpe:/a:redhat:openshift:4.20::el9",
    "package" : "rhcos-4.20.9.6.202601211057-0"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "libssh2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "libssh2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "libssh",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-5987\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-5987\nhttps://www.libssh.org/security/advisories/CVE-2025-5987.txt" ],
  "name" : "CVE-2025-5987",
  "csaw" : false
}