The following table lists the changes that have been made to the
CVE-2025-4877 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Aug. 20, 2025
Action Type Old Value New Value Added Description There’s a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it’s possible that the program perform out of bounds write leading to a heap corruption.
This issue affects only 32-bits builds of libssh.Added CVSS V3.1 AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L Added CWE CWE-787 Added Reference https://access.redhat.com/security/cve/CVE-2025-4877 Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=2376193 Added Reference https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=6fd9cc8ce3958092a1aae11f1f2e911b2747732d Added Reference https://www.libssh.org/security/advisories/CVE-2025-4877.txt