Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2019:1791 - Security Advisory
Issued:
2019-07-16
Updated:
2019-07-16

RHSA-2019:1791 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: libssh2 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for libssh2 is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The libssh2 packages provide a library that implements the SSH2 protocol.

Security Fix(es):

  • libssh2: Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855)
  • libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856)
  • libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857)
  • libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing these updated packages, all running applications using libssh2 must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5 ppc64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5 ppc64le
  • Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64

Fixes

  • BZ - 1687303 - CVE-2019-3855 libssh2: Integer overflow in transport read resulting in out of bounds write
  • BZ - 1687304 - CVE-2019-3856 libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write
  • BZ - 1687305 - CVE-2019-3857 libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write
  • BZ - 1687313 - CVE-2019-3863 libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes

CVEs

  • CVE-2019-3855
  • CVE-2019-3856
  • CVE-2019-3857
  • CVE-2019-3863

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5

SRPM
libssh2-1.4.3-11.el7_5.1.src.rpm SHA-256: beae1c4890757a6664a234ce4b4de7238d8c5d0f55b1e272876bce9445aa311f
x86_64
libssh2-1.4.3-11.el7_5.1.i686.rpm SHA-256: 4a213a1b29868f7bf6379125e12cb6e0b5b0706f4ea802ccd46ecd4d9a678c84
libssh2-1.4.3-11.el7_5.1.x86_64.rpm SHA-256: 78862bffda0ff4e8b92da861ce866f0e4b3b689077ed21a2bf942e59bcf5b3d5
libssh2-debuginfo-1.4.3-11.el7_5.1.i686.rpm SHA-256: 297eb7aae5073a0fac060eb983edbd1072d01be7bd5475350865a650c4cae9a9
libssh2-debuginfo-1.4.3-11.el7_5.1.i686.rpm SHA-256: 297eb7aae5073a0fac060eb983edbd1072d01be7bd5475350865a650c4cae9a9
libssh2-debuginfo-1.4.3-11.el7_5.1.x86_64.rpm SHA-256: 1b5fb2580ebe0db2e5e01709f7361f66e52d9c74e25612f6fa0c21964ab56d6c
libssh2-debuginfo-1.4.3-11.el7_5.1.x86_64.rpm SHA-256: 1b5fb2580ebe0db2e5e01709f7361f66e52d9c74e25612f6fa0c21964ab56d6c
libssh2-devel-1.4.3-11.el7_5.1.i686.rpm SHA-256: e4f4a8236ed6e5d5b60e473425c77c1a3345b3a08051129a2c75efee226c6005
libssh2-devel-1.4.3-11.el7_5.1.x86_64.rpm SHA-256: 96b24490ecb5b0c41159ac0bcc716112c48cfa29d65ae69b5af1bc70686fa443
libssh2-docs-1.4.3-11.el7_5.1.noarch.rpm SHA-256: cc058b0ef983ffa6460d9b33c00e7c60c7e224c91794c20454a58379844bb603

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5

SRPM
libssh2-1.4.3-11.el7_5.1.src.rpm SHA-256: beae1c4890757a6664a234ce4b4de7238d8c5d0f55b1e272876bce9445aa311f
s390x
libssh2-1.4.3-11.el7_5.1.s390.rpm SHA-256: 092cdc762432ae0d9b6abab046098d83881ffecf630ce8f62ed9a3b7ecca6dca
libssh2-1.4.3-11.el7_5.1.s390x.rpm SHA-256: 41197e7b6d29c992f6106fd8a817a2e2cd5d07220d3a271a2c0725cedfe8e66c
libssh2-debuginfo-1.4.3-11.el7_5.1.s390.rpm SHA-256: a70f086ab9e0d19723f7bc617fba6e2f2ced4e4d1b1fb78509a21fec97974e0c
libssh2-debuginfo-1.4.3-11.el7_5.1.s390.rpm SHA-256: a70f086ab9e0d19723f7bc617fba6e2f2ced4e4d1b1fb78509a21fec97974e0c
libssh2-debuginfo-1.4.3-11.el7_5.1.s390x.rpm SHA-256: 9209b4c4dc8db5d8c1e5168b58e8297e4e911cf22857fb41b4b67ed7f0e065c8
libssh2-debuginfo-1.4.3-11.el7_5.1.s390x.rpm SHA-256: 9209b4c4dc8db5d8c1e5168b58e8297e4e911cf22857fb41b4b67ed7f0e065c8
libssh2-devel-1.4.3-11.el7_5.1.s390.rpm SHA-256: 175ceb213ab20f9b3be08cb2acdf6cbc763f590be005482d3ed9a5d0be589ae7
libssh2-devel-1.4.3-11.el7_5.1.s390x.rpm SHA-256: efd4792438cc059978f7e399ea240ec28b204026f8713c5a885c8c990c954f86
libssh2-docs-1.4.3-11.el7_5.1.noarch.rpm SHA-256: cc058b0ef983ffa6460d9b33c00e7c60c7e224c91794c20454a58379844bb603

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5

SRPM
libssh2-1.4.3-11.el7_5.1.src.rpm SHA-256: beae1c4890757a6664a234ce4b4de7238d8c5d0f55b1e272876bce9445aa311f
ppc64
libssh2-1.4.3-11.el7_5.1.ppc.rpm SHA-256: 41954b3efbe3d316c3151cb7e42839c7b3ebafa0ca6faededc1db8db5a0105b2
libssh2-1.4.3-11.el7_5.1.ppc64.rpm SHA-256: b431d3a418cbb8872868d91a72b70b249e7b3547c40d2e610db83d44fcd1696e
libssh2-debuginfo-1.4.3-11.el7_5.1.ppc.rpm SHA-256: 4ba552c2b09b0d0a78b53492e0df370c45827d08672f2e338cc85ae7cc02632a
libssh2-debuginfo-1.4.3-11.el7_5.1.ppc.rpm SHA-256: 4ba552c2b09b0d0a78b53492e0df370c45827d08672f2e338cc85ae7cc02632a
libssh2-debuginfo-1.4.3-11.el7_5.1.ppc64.rpm SHA-256: 85dd3a9ee5d2362674a77e7835d9a56a6fea8954a4cb71d350ca3bb5be215cfa
libssh2-debuginfo-1.4.3-11.el7_5.1.ppc64.rpm SHA-256: 85dd3a9ee5d2362674a77e7835d9a56a6fea8954a4cb71d350ca3bb5be215cfa
libssh2-devel-1.4.3-11.el7_5.1.ppc.rpm SHA-256: 74c757d9b4a5422c4dcd3cb944379ff7fb6e4372106e00d2c4fe7889e5a3afe7
libssh2-devel-1.4.3-11.el7_5.1.ppc64.rpm SHA-256: e4ab57433f46f8bc007b5562cef7684a23b1d2b683fc249018341e456d144a65
libssh2-docs-1.4.3-11.el7_5.1.noarch.rpm SHA-256: cc058b0ef983ffa6460d9b33c00e7c60c7e224c91794c20454a58379844bb603

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5

SRPM
libssh2-1.4.3-11.el7_5.1.src.rpm SHA-256: beae1c4890757a6664a234ce4b4de7238d8c5d0f55b1e272876bce9445aa311f
ppc64le
libssh2-1.4.3-11.el7_5.1.ppc64le.rpm SHA-256: 378f6c2e940bb7bd007cf824062b998a733ebc746e9a8f520727de28d62d7e4d
libssh2-debuginfo-1.4.3-11.el7_5.1.ppc64le.rpm SHA-256: 8de9dc6a8bea700c88bf5da67c78f1ac5b337f1e5aab8a9869712b7ea7df8dd2
libssh2-debuginfo-1.4.3-11.el7_5.1.ppc64le.rpm SHA-256: 8de9dc6a8bea700c88bf5da67c78f1ac5b337f1e5aab8a9869712b7ea7df8dd2
libssh2-devel-1.4.3-11.el7_5.1.ppc64le.rpm SHA-256: f8bf7abf5e6b5069d540deafc0274f3e645b5163cf9d39e236eedb395bc44495
libssh2-docs-1.4.3-11.el7_5.1.noarch.rpm SHA-256: cc058b0ef983ffa6460d9b33c00e7c60c7e224c91794c20454a58379844bb603

Red Hat Enterprise Linux EUS Compute Node 7.5

SRPM
libssh2-1.4.3-11.el7_5.1.src.rpm SHA-256: beae1c4890757a6664a234ce4b4de7238d8c5d0f55b1e272876bce9445aa311f
x86_64
libssh2-1.4.3-11.el7_5.1.i686.rpm SHA-256: 4a213a1b29868f7bf6379125e12cb6e0b5b0706f4ea802ccd46ecd4d9a678c84
libssh2-1.4.3-11.el7_5.1.x86_64.rpm SHA-256: 78862bffda0ff4e8b92da861ce866f0e4b3b689077ed21a2bf942e59bcf5b3d5
libssh2-debuginfo-1.4.3-11.el7_5.1.i686.rpm SHA-256: 297eb7aae5073a0fac060eb983edbd1072d01be7bd5475350865a650c4cae9a9
libssh2-debuginfo-1.4.3-11.el7_5.1.i686.rpm SHA-256: 297eb7aae5073a0fac060eb983edbd1072d01be7bd5475350865a650c4cae9a9
libssh2-debuginfo-1.4.3-11.el7_5.1.x86_64.rpm SHA-256: 1b5fb2580ebe0db2e5e01709f7361f66e52d9c74e25612f6fa0c21964ab56d6c
libssh2-debuginfo-1.4.3-11.el7_5.1.x86_64.rpm SHA-256: 1b5fb2580ebe0db2e5e01709f7361f66e52d9c74e25612f6fa0c21964ab56d6c
libssh2-devel-1.4.3-11.el7_5.1.i686.rpm SHA-256: e4f4a8236ed6e5d5b60e473425c77c1a3345b3a08051129a2c75efee226c6005
libssh2-devel-1.4.3-11.el7_5.1.x86_64.rpm SHA-256: 96b24490ecb5b0c41159ac0bcc716112c48cfa29d65ae69b5af1bc70686fa443
libssh2-docs-1.4.3-11.el7_5.1.noarch.rpm SHA-256: cc058b0ef983ffa6460d9b33c00e7c60c7e224c91794c20454a58379844bb603

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility