[SECURITY] [DLA 4385-1] libssh security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4385-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
November 27, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : libssh
Version : 0.9.8-0+deb11u2
CVE ID : CVE-2025-4877 CVE-2025-4878 CVE-2025-5318 CVE-2025-5372
CVE-2025-8114 CVE-2025-8277
Debian Bug : 1108407 1109860 1114859
Several vulnerabilities have been found in libssh, a tiny C SSH library.
CVE-2025-4877
Ronald Crane found that bin_to_base64() could experience an integer
overflow and subsequent under allocation, leading to an out of
bounds write on 32-bit builds.
CVE-2025-4878
Ronald Crane found that privatekey_from_file() used an uninitialized
variable under certain conditions, which could lead to signing
failure, use-after-free or memory corruption.
CVE-2025-5318
Ronald Crane found that sftp_handle() had an incorrect check, which
could lead to an out of bounds read.
CVE-2025-5372
Ronald Crane found that ssh_kdf() returned a success code on
certain failures, which could lead to use of uninitialized
cryptographic keys and failing to encrypt/decrypt following
communication.
CVE-2025-8114
Philippe Antoine found a null pointer dereference issue when libssh
calculates the session id for the key exchange (KEX) process and an
error happens when allocating memory using cryptographic functions,
leading to a crash.
CVE-2025-8277
Francesco Rollo a memory leak during the KEX process when a client
sets the `first_kex_packet_follows` flag in the KEXINIT message and
repeatedly makes incorrect KEX guesses.
For Debian 11 bullseye, these problems have been fixed in version
0.9.8-0+deb11u2.
We recommend that you upgrade your libssh packages.
For the detailed security status of libssh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libssh
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=L7sO
-----END PGP SIGNATURE-----
Reply to: