Package "libssh"
  
    
    
        | Name: | libssh | 
    
        | Description:
 | This package is just an umbrella for a group of other packages,
            it has no description.Description samples from packages in group:
 
                    tiny C SSH library (OpenSSL flavor)tiny C SSH library - Development files (OpenSSL flavor)tiny C SSH library - Documentation files | 
    
        | Latest version: | 0.11.1-1ubuntu0.2 | 
    
        | Release: | plucky (25.04) | 
    
        | Level: | security | 
    
        | Repository: | main | 
    
   
  
  
 
Links
Other versions of "libssh" in Plucky
    
Packages in group
Deleted packages are displayed in grey.
Changelog
    
    
    
        
        
    
    
        |   libssh (0.11.1-1ubuntu0.2) plucky-security; urgency=medium   * SECURITY UPDATE: NULL pointer dereference
- debian/patches/CVE-2025-8114.patch: sets rc to SSH_ERROR prior to goto
 error in ssh_make_sessionid() of src/kex.c.
 - CVE-2025-8114
  -- Ian Constantin <email address hidden>  Wed, 29 Oct 2025 14:57:57 +0200 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2025-8114 | A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an all |  | 
    
    
    
    
    
        
        
    
    
        |   libssh (0.11.1-1ubuntu0.1) plucky-security; urgency=medium   * SECURITY UPDATE: Write beyond bounds in binary to base64 conversion
functions
 - debian/patches/CVE-2025-4877.patch: prevent integer overflow and
 potential OOB.
 - CVE-2025-4877
 * SECURITY UPDATE: Use of uninitialized variable in
 privatekey_from_file()
 - debian/patches/CVE-2025-4878-1.patch: initialize pointers where
 possible.
 - debian/patches/CVE-2025-4878-2.patch: properly check return value to
 avoid NULL pointer dereference.
 - CVE-2025-4878
 * SECURITY UPDATE: OOB read in sftp_handle function
 - debian/patches/CVE-2025-5318.patch: fix possible buffer overrun.
 - CVE-2025-5318
 * SECURITY UPDATE: Double free in functions exporting keys
 - debian/patches/CVE-2025-5351.patch: avoid double-free on low-memory
 conditions.
 - CVE-2025-5351
 * SECURITY UPDATE: ssh_kdf() returns a success code on certain failures
 - debian/patches/CVE-2025-5372-pre1.patch: Reformat ssh_kdf().
 - debian/patches/CVE-2025-5372.patch: simplify error checking and
 handling of return codes in ssh_kdf().
 - CVE-2025-5372
 * SECURITY UPDATE: Likely read beyond bounds in sftp server message
 decoding
 - debian/patches/CVE-2025-5449-1.patch: avoid memory leak when we run
 out of handles during sftp_open.
 - debian/patches/CVE-2025-5449-2.patch: reproducer for sftp handles
 exhaustion.
 - debian/patches/CVE-2025-5449-3.patch: avoid NULL dereference for
 invalid handles.
 - debian/patches/CVE-2025-5449-4.patch: fix possible read behind buffer
 on 32bit arch.
 - debian/patches/CVE-2025-5449-5.patch: use constant for return values.
 - CVE-2025-5449
 * SECURITY UPDATE: Invalid return code for chacha20 poly1305 with OpenSSL
 backend
 - debian/patches/CVE-2025-5987.patch: correctly detect failures of
 chacha initialization.
 - CVE-2025-5987
 * SECURITY UPDATE: Missing packet filter may expose to variant of
 Terrapin attack
 - debian/patches/missing_packet_filter.patch: implement missing packet
 filter for DH GEX.
 - No CVE number
  -- Marc Deslauriers <email address hidden>  Mon, 30 Jun 2025 09:40:59 -0400 | 
    
        
        | 
                
                | CVE-2025-5318 | A flaw was found in the libssh library. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that |  
                | CVE-2025-5351 | A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys i |  
                | CVE-2025-5372 | A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates