WID-SEC-W-2025-1423

Vulnerability from csaf_certbund - Published: 2025-06-29 22:00 - Updated: 2026-02-04 23:00
Summary
libssh: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: libssh ist eine C Bibliothek für das Anbieten von SSH Diensten auf Client- und Serverseite. Sie kann genutzt werden, um aus der Ferne Programme auszuführen, Dateien zu übertragen oder als sicherer und transparenter Tunnel für entfernte Programme genutzt werden.
Angriff: Ein Angreifer kann mehrere Schwachstellen in libssh ausnutzen, um einen Denial of Service Angriff durchzuführen, um Sicherheitsvorkehrungen zu umgehen, und potentiell weitere nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme: - Linux - Sonstiges - UNIX - Windows
References
https://wid.cert-bund.de/.well-known/csaf/white/2… self
https://wid.cert-bund.de/portal/wid/securityadvis… self
https://www.libssh.org/2025/06/24/libssh-0-11-2-s… external
https://seclists.org/oss-sec/2025/q2/284 external
https://lists.suse.com/pipermail/sle-security-upd… external
https://ubuntu.com/security/notices/USN-7619-1 external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://ubuntu.com/security/notices/USN-7696-1 external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://www.ibm.com/support/pages/node/7246875 external
https://access.redhat.com/errata/RHSA-2025:18231 external
https://linux.oracle.com/errata/ELSA-2025-18275.html external
https://errata.build.resf.org/RLSA-2025:18275 external
https://access.redhat.com/errata/RHSA-2025:18286 external
https://errata.build.resf.org/RLSA-2025:18231 external
https://www.dell.com/support/kbdoc/000385435 external
https://access.redhat.com/errata/RHSA-2025:19401 external
https://access.redhat.com/errata/RHSA-2025:19400 external
https://access.redhat.com/errata/RHSA-2025:19470 external
https://access.redhat.com/errata/RHSA-2025:19472 external
https://www.dell.com/support/kbdoc/000385230 external
https://access.redhat.com/errata/RHSA-2025:19300 external
https://access.redhat.com/errata/RHSA-2025:19313 external
https://access.redhat.com/errata/RHSA-2025:19807 external
https://access.redhat.com/errata/RHSA-2025:21013 external
https://access.redhat.com/errata/RHSA-2025:20943 external
https://access.redhat.com/errata/RHSA-2025:21977 external
https://errata.build.resf.org/RLSA-2025:21977 external
https://linux.oracle.com/errata/ELSA-2025-21977.html external
https://access.redhat.com/errata/RHSA-2025:21829 external
https://www.meinberg.de/german/news/meinberg-secu… external
https://errata.build.resf.org/RLSA-2025:18286 external
https://security.netapp.com/advisory/NTAP-20251128-0005 external
https://linux.oracle.com/errata/ELSA-2025-21013.html external
https://access.redhat.com/errata/RHSA-2025:23024 external
https://access.redhat.com/errata/RHSA-2025:23484 external
https://www.ibm.com/support/pages/node/7255154 external
https://linux.oracle.com/errata/ELSA-2025-23484.html external
https://errata.build.resf.org/RLSA-2025:23484 external
https://access.redhat.com/errata/RHSA-2025:23483 external
https://linux.oracle.com/errata/ELSA-2025-23483.html external
https://errata.build.resf.org/RLSA-2025:23483 external
https://www.ibm.com/support/pages/node/7256201 external
https://access.redhat.com/errata/RHSA-2026:0431 external
https://access.redhat.com/errata/RHSA-2026:0428 external
https://access.redhat.com/errata/RHSA-2026:0430 external
https://access.redhat.com/errata/RHSA-2026:0427 external
https://access.redhat.com/errata/RHSA-2026:0934 external
https://access.redhat.com/errata/RHSA-2026:0950 external
https://access.redhat.com/errata/RHSA-2026:0702 external
https://access.redhat.com/errata/RHSA-2026:0978 external
https://access.redhat.com/errata/RHSA-2026:0996 external
https://access.redhat.com/errata/RHSA-2026:0985 external
https://access.redhat.com/errata/RHSA-2026:0980 external
https://access.redhat.com/errata/RHSA-2026:1539 external

{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "libssh ist eine C Bibliothek f\u00fcr das Anbieten von SSH Diensten auf Client- und Serverseite. Sie kann genutzt werden, um aus der Ferne Programme auszuf\u00fchren, Dateien zu \u00fcbertragen oder als sicherer und transparenter Tunnel f\u00fcr entfernte Programme genutzt werden.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in libssh ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, um Sicherheitsvorkehrungen zu umgehen, und potentiell weitere nicht spezifizierte Auswirkungen zu verursachen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2025-1423 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1423.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2025-1423 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1423"
      },
      {
        "category": "external",
        "summary": "libssh. org vom 2025-06-29",
        "url": "https://www.libssh.org/2025/06/24/libssh-0-11-2-security-and-bugfix-release/"
      },
      {
        "category": "external",
        "summary": "libssh security and bugfix release vom 2025-06-29",
        "url": "https://seclists.org/oss-sec/2025/q2/284"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02229-1 vom 2025-07-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021759.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7619-1 vom 2025-07-07",
        "url": "https://ubuntu.com/security/notices/USN-7619-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02281-1 vom 2025-07-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021789.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02279-1 vom 2025-07-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021791.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02278-1 vom 2025-07-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021792.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2025-18E8506D3A vom 2025-07-22",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-18e8506d3a"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:02755-1 vom 2025-08-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022132.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7696-1 vom 2025-08-19",
        "url": "https://ubuntu.com/security/notices/USN-7696-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20557-1 vom 2025-08-19",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022231.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20596-1 vom 2025-08-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022366.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7246875 vom 2025-10-01",
        "url": "https://www.ibm.com/support/pages/node/7246875"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:18231 vom 2025-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2025:18231"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-18275 vom 2025-10-17",
        "url": "https://linux.oracle.com/errata/ELSA-2025-18275.html"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:18275 vom 2025-10-18",
        "url": "https://errata.build.resf.org/RLSA-2025:18275"
      },
      {
        "category": "external",
        "summary": "RedHat Security Advisory",
        "url": "https://access.redhat.com/errata/RHSA-2025:18286"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:18231 vom 2025-10-18",
        "url": "https://errata.build.resf.org/RLSA-2025:18231"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
        "url": "https://www.dell.com/support/kbdoc/000385435"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19401 vom 2025-11-03",
        "url": "https://access.redhat.com/errata/RHSA-2025:19401"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19400 vom 2025-11-03",
        "url": "https://access.redhat.com/errata/RHSA-2025:19400"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19470 vom 2025-11-03",
        "url": "https://access.redhat.com/errata/RHSA-2025:19470"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19472 vom 2025-11-03",
        "url": "https://access.redhat.com/errata/RHSA-2025:19472"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
        "url": "https://www.dell.com/support/kbdoc/000385230"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19300 vom 2025-11-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:19300"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19313 vom 2025-11-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:19313"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19807 vom 2025-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2025:19807"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21013 vom 2025-11-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:21013"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:20943 vom 2025-11-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:20943"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21977 vom 2025-11-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:21977"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:21977 vom 2025-11-25",
        "url": "https://errata.build.resf.org/RLSA-2025:21977"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-21977 vom 2025-11-25",
        "url": "https://linux.oracle.com/errata/ELSA-2025-21977.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21829 vom 2025-11-27",
        "url": "https://access.redhat.com/errata/RHSA-2025:21829"
      },
      {
        "category": "external",
        "summary": "Meinberg Security Advisory MBGSA-2025.05 vom 2025-11-27",
        "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2025-05-lantime-firmware-v7-08-025.htm"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:18286 vom 2025-11-28",
        "url": "https://errata.build.resf.org/RLSA-2025:18286"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory NTAP-20251128-0005 vom 2025-11-28",
        "url": "https://security.netapp.com/advisory/NTAP-20251128-0005"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-21013 vom 2025-12-04",
        "url": "https://linux.oracle.com/errata/ELSA-2025-21013.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:23024 vom 2025-12-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:23024"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:23484 vom 2025-12-18",
        "url": "https://access.redhat.com/errata/RHSA-2025:23484"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7255154 vom 2025-12-17",
        "url": "https://www.ibm.com/support/pages/node/7255154"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-23484 vom 2025-12-18",
        "url": "https://linux.oracle.com/errata/ELSA-2025-23484.html"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:23484 vom 2025-12-18",
        "url": "https://errata.build.resf.org/RLSA-2025:23484"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:23483 vom 2025-12-18",
        "url": "https://access.redhat.com/errata/RHSA-2025:23483"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-23483 vom 2025-12-18",
        "url": "https://linux.oracle.com/errata/ELSA-2025-23483.html"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:23483 vom 2025-12-19",
        "url": "https://errata.build.resf.org/RLSA-2025:23483"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7256201 vom 2026-01-05",
        "url": "https://www.ibm.com/support/pages/node/7256201"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0431 vom 2026-01-12",
        "url": "https://access.redhat.com/errata/RHSA-2026:0431"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0428 vom 2026-01-12",
        "url": "https://access.redhat.com/errata/RHSA-2026:0428"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0430 vom 2026-01-12",
        "url": "https://access.redhat.com/errata/RHSA-2026:0430"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0427 vom 2026-01-12",
        "url": "https://access.redhat.com/errata/RHSA-2026:0427"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0934 vom 2026-01-22",
        "url": "https://access.redhat.com/errata/RHSA-2026:0934"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0950 vom 2026-01-22",
        "url": "https://access.redhat.com/errata/RHSA-2026:0950"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0702 vom 2026-01-22",
        "url": "https://access.redhat.com/errata/RHSA-2026:0702"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0978 vom 2026-01-27",
        "url": "https://access.redhat.com/errata/RHSA-2026:0978"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0996 vom 2026-01-30",
        "url": "https://access.redhat.com/errata/RHSA-2026:0996"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0985 vom 2026-01-30",
        "url": "https://access.redhat.com/errata/RHSA-2026:0985"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0980 vom 2026-02-03",
        "url": "https://access.redhat.com/errata/RHSA-2026:0980"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:1539 vom 2026-02-04",
        "url": "https://access.redhat.com/errata/RHSA-2026:1539"
      }
    ],
    "source_lang": "en-US",
    "title": "libssh: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2026-02-04T23:00:00.000+00:00",
      "generator": {
        "date": "2026-02-05T10:00:31.809+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.5.0"
        }
      },
      "id": "WID-SEC-W-2025-1423",
      "initial_release_date": "2025-06-29T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2025-06-29T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-07-06T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-07T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-10T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-07-21T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2025-07-22T22:00:00.000+00:00",
          "number": "6",
          "summary": "Referenz(en) aufgenommen: EUVD-2025-22335"
        },
        {
          "date": "2025-08-11T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-08-19T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
        },
        {
          "date": "2025-08-31T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-10-01T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-10-15T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-16T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-10-19T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
        },
        {
          "date": "2025-10-30T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2025-11-02T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-04T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2025-11-05T23:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-09T23:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-11T23:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-24T23:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-25T23:00:00.000+00:00",
          "number": "21",
          "summary": "doppelter Eintrag entfernt"
        },
        {
          "date": "2025-11-26T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-27T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Meinberg aufgenommen"
        },
        {
          "date": "2025-12-03T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-12-09T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-12-17T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat, IBM und Oracle Linux aufgenommen"
        },
        {
          "date": "2025-12-18T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2026-01-04T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2026-01-11T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-01-12T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-01-21T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-01-22T23:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-01-27T23:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-02-01T23:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-02-03T23:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-02-04T23:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "36"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Dell Avamar",
            "product": {
              "name": "Dell Avamar",
              "product_id": "T039664",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:avamar:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "Virtual Edition",
                "product": {
                  "name": "Dell NetWorker Virtual Edition",
                  "product_id": "T048226",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:networker:virtual_edition"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "NetWorker"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Appliance \u003c5.32.00.18",
                "product": {
                  "name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
                  "product_id": "T048301"
                }
              },
              {
                "category": "product_version",
                "name": "Appliance 5.32.00.18",
                "product": {
                  "name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
                  "product_id": "T048301-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Secure Connect Gateway"
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c12.16.0",
                "product": {
                  "name": "IBM App Connect Enterprise \u003c12.16.0",
                  "product_id": "T047348"
                }
              },
              {
                "category": "product_version",
                "name": "12.16.0",
                "product": {
                  "name": "IBM App Connect Enterprise 12.16.0",
                  "product_id": "T047348-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:app_connect_enterprise:12.16.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c12.0.16",
                "product": {
                  "name": "IBM App Connect Enterprise \u003c12.0.16",
                  "product_id": "T047349"
                }
              },
              {
                "category": "product_version",
                "name": "12.0.16",
                "product": {
                  "name": "IBM App Connect Enterprise 12.0.16",
                  "product_id": "T047349-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.16"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "App Connect Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP14 IF03",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF03",
                  "product_id": "T049499"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP14 IF03",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP14 IF03",
                  "product_id": "T049499-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if03"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c10.0.9.1",
                "product": {
                  "name": "IBM Security Verify Access \u003c10.0.9.1",
                  "product_id": "T049459"
                }
              },
              {
                "category": "product_version",
                "name": "10.0.9.1",
                "product": {
                  "name": "IBM Security Verify Access 10.0.9.1",
                  "product_id": "T049459-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:security_verify_access:v10.0.9.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Security Verify Access"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.08.025",
                "product": {
                  "name": "Meinberg LANTIME \u003c7.08.025",
                  "product_id": "T048944"
                }
              },
              {
                "category": "product_version",
                "name": "7.08.025",
                "product": {
                  "name": "Meinberg LANTIME 7.08.025",
                  "product_id": "T048944-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:meinberg:lantime:7.08.025"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "LANTIME"
          }
        ],
        "category": "vendor",
        "name": "Meinberg"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "Baseboard Management Controller",
                "product": {
                  "name": "NetApp AFF Baseboard Management Controller",
                  "product_id": "T025086",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:netapp:aff:::baseboard_management_controller"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "AFF"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "for VMware vSphere",
                "product": {
                  "name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
                  "product_id": "T025152",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "ActiveIQ Unified Manager"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "Baseboard Management Controller",
                "product": {
                  "name": "NetApp FAS Baseboard Management Controller",
                  "product_id": "T043535",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:netapp:fas:baseboard_management_controller"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FAS"
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c0.11.2",
                "product": {
                  "name": "Open Source libssh \u003c0.11.2",
                  "product_id": "T044955"
                }
              },
              {
                "category": "product_version",
                "name": "0.11.2",
                "product": {
                  "name": "Open Source libssh 0.11.2",
                  "product_id": "T044955-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libssh:libssh:0.11.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "libssh"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "T037727",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.17.43",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.17.43",
                  "product_id": "T048318"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.17.43",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.17.43",
                  "product_id": "T048318-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.17.43"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.20.12",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.20.12",
                  "product_id": "T050329"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.20.12",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.20.12",
                  "product_id": "T050329-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.20.12"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-4877",
      "product_status": {
        "known_affected": [
          "T037727",
          "T025086",
          "T025152",
          "67646",
          "T004914",
          "T032255",
          "74185",
          "T039664",
          "T048318",
          "T047348",
          "T048944",
          "T047349",
          "T002207",
          "T043535",
          "T044955",
          "T000126",
          "T050329",
          "T049499",
          "T049459",
          "T048226",
          "T048301"
        ]
      },
      "release_date": "2025-06-29T22:00:00.000+00:00",
      "title": "CVE-2025-4877"
    },
    {
      "cve": "CVE-2025-5351",
      "product_status": {
        "known_affected": [
          "T037727",
          "T025086",
          "T025152",
          "67646",
          "T004914",
          "T032255",
          "74185",
          "T039664",
          "T048318",
          "T047348",
          "T048944",
          "T047349",
          "T002207",
          "T043535",
          "T044955",
          "T000126",
          "T050329",
          "T049499",
          "T049459",
          "T048226",
          "T048301"
        ]
      },
      "release_date": "2025-06-29T22:00:00.000+00:00",
      "title": "CVE-2025-5351"
    },
    {
      "cve": "CVE-2025-5449",
      "product_status": {
        "known_affected": [
          "T037727",
          "T025086",
          "T025152",
          "67646",
          "T004914",
          "T032255",
          "74185",
          "T039664",
          "T048318",
          "T047348",
          "T048944",
          "T047349",
          "T002207",
          "T043535",
          "T044955",
          "T000126",
          "T050329",
          "T049499",
          "T049459",
          "T048226",
          "T048301"
        ]
      },
      "release_date": "2025-06-29T22:00:00.000+00:00",
      "title": "CVE-2025-5449"
    },
    {
      "cve": "CVE-2025-4878",
      "product_status": {
        "known_affected": [
          "T037727",
          "T025086",
          "T025152",
          "67646",
          "T004914",
          "T032255",
          "74185",
          "T039664",
          "T048318",
          "T047348",
          "T048944",
          "T047349",
          "T002207",
          "T043535",
          "T044955",
          "T000126",
          "T050329",
          "T049499",
          "T049459",
          "T048226",
          "T048301"
        ]
      },
      "release_date": "2025-06-29T22:00:00.000+00:00",
      "title": "CVE-2025-4878"
    },
    {
      "cve": "CVE-2025-5318",
      "product_status": {
        "known_affected": [
          "T037727",
          "T025086",
          "T025152",
          "67646",
          "T004914",
          "T032255",
          "74185",
          "T039664",
          "T048318",
          "T047348",
          "T048944",
          "T047349",
          "T002207",
          "T043535",
          "T044955",
          "T000126",
          "T050329",
          "T049499",
          "T049459",
          "T048226",
          "T048301"
        ]
      },
      "release_date": "2025-06-29T22:00:00.000+00:00",
      "title": "CVE-2025-5318"
    },
    {
      "cve": "CVE-2025-5372",
      "product_status": {
        "known_affected": [
          "T037727",
          "T025086",
          "T025152",
          "67646",
          "T004914",
          "T032255",
          "74185",
          "T039664",
          "T048318",
          "T047348",
          "T048944",
          "T047349",
          "T002207",
          "T043535",
          "T044955",
          "T000126",
          "T050329",
          "T049499",
          "T049459",
          "T048226",
          "T048301"
        ]
      },
      "release_date": "2025-06-29T22:00:00.000+00:00",
      "title": "CVE-2025-5372"
    },
    {
      "cve": "CVE-2025-5987",
      "product_status": {
        "known_affected": [
          "T037727",
          "T025086",
          "T025152",
          "67646",
          "T004914",
          "T032255",
          "74185",
          "T039664",
          "T048318",
          "T047348",
          "T048944",
          "T047349",
          "T002207",
          "T043535",
          "T044955",
          "T000126",
          "T050329",
          "T049499",
          "T049459",
          "T048226",
          "T048301"
        ]
      },
      "release_date": "2025-06-29T22:00:00.000+00:00",
      "title": "CVE-2025-5987"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…