UbuntuUpdates.org

Package "libssh"

Name: libssh

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • tiny C SSH library (OpenSSL flavor)
  • tiny C SSH library - Development files (OpenSSL flavor)
  • tiny C SSH library - Documentation files

Latest version: 0.11.1-1ubuntu0.1
Release: plucky (25.04)
Level: security
Repository: main

Links



Other versions of "libssh" in Plucky

Repository Area Version
base main 0.11.1-1
updates main 0.11.1-1ubuntu0.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 0.11.1-1ubuntu0.1 2025-07-07 16:07:10 UTC

  libssh (0.11.1-1ubuntu0.1) plucky-security; urgency=medium

  * SECURITY UPDATE: Write beyond bounds in binary to base64 conversion
    functions
    - debian/patches/CVE-2025-4877.patch: prevent integer overflow and
      potential OOB.
    - CVE-2025-4877
  * SECURITY UPDATE: Use of uninitialized variable in
    privatekey_from_file()
    - debian/patches/CVE-2025-4878-1.patch: initialize pointers where
      possible.
    - debian/patches/CVE-2025-4878-2.patch: properly check return value to
      avoid NULL pointer dereference.
    - CVE-2025-4878
  * SECURITY UPDATE: OOB read in sftp_handle function
    - debian/patches/CVE-2025-5318.patch: fix possible buffer overrun.
    - CVE-2025-5318
  * SECURITY UPDATE: Double free in functions exporting keys
    - debian/patches/CVE-2025-5351.patch: avoid double-free on low-memory
      conditions.
    - CVE-2025-5351
  * SECURITY UPDATE: ssh_kdf() returns a success code on certain failures
    - debian/patches/CVE-2025-5372-pre1.patch: Reformat ssh_kdf().
    - debian/patches/CVE-2025-5372.patch: simplify error checking and
      handling of return codes in ssh_kdf().
    - CVE-2025-5372
  * SECURITY UPDATE: Likely read beyond bounds in sftp server message
    decoding
    - debian/patches/CVE-2025-5449-1.patch: avoid memory leak when we run
      out of handles during sftp_open.
    - debian/patches/CVE-2025-5449-2.patch: reproducer for sftp handles
      exhaustion.
    - debian/patches/CVE-2025-5449-3.patch: avoid NULL dereference for
      invalid handles.
    - debian/patches/CVE-2025-5449-4.patch: fix possible read behind buffer
      on 32bit arch.
    - debian/patches/CVE-2025-5449-5.patch: use constant for return values.
    - CVE-2025-5449
  * SECURITY UPDATE: Invalid return code for chacha20 poly1305 with OpenSSL
    backend
    - debian/patches/CVE-2025-5987.patch: correctly detect failures of
      chacha initialization.
    - CVE-2025-5987
  * SECURITY UPDATE: Missing packet filter may expose to variant of
    Terrapin attack
    - debian/patches/missing_packet_filter.patch: implement missing packet
      filter for DH GEX.
    - No CVE number

 -- Marc Deslauriers <email address hidden> Mon, 30 Jun 2025 09:40:59 -0400

CVE-2025-5318 A flaw was found in the libssh library. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that
CVE-2025-5351 A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys i
CVE-2025-5372 A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation



About   -   Send Feedback to @ubuntu_updates