Package "libssh-4"
  
    
    
        | Name: | 
        libssh-4
            
         | 
    
    
         Description: | 
        
             tiny C SSH library (OpenSSL flavor) 
         | 
    
    
        | Latest version: | 
        0.11.1-1ubuntu0.2 | 
    
    
        | Release: | 
        plucky (25.04) | 
    
    
        | Level: | 
        updates | 
    
    
        | Repository: | 
        main | 
    
         
            | Head package: | 
            libssh | 
         
        
            | Homepage: | 
            https://www.libssh.org/ | 
        
    
   
  
  
 
Links
    Download "libssh-4"
    
Other versions of "libssh-4" in Plucky
    
Changelog
    
    
    
        
        
    
    
        | 
               libssh (0.11.1-1ubuntu0.2) plucky-security; urgency=medium 
  * SECURITY UPDATE: NULL pointer dereference
     - debian/patches/CVE-2025-8114.patch: sets rc to SSH_ERROR prior to goto
       error in ssh_make_sessionid() of src/kex.c.
     - CVE-2025-8114 
 -- Ian Constantin <email address hidden>  Wed, 29 Oct 2025 14:57:57 +0200 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2025-8114 | 
                A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an all | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               libssh (0.11.1-1ubuntu0.1) plucky-security; urgency=medium 
  * SECURITY UPDATE: Write beyond bounds in binary to base64 conversion
     functions
     - debian/patches/CVE-2025-4877.patch: prevent integer overflow and
       potential OOB.
     - CVE-2025-4877
   * SECURITY UPDATE: Use of uninitialized variable in
     privatekey_from_file()
     - debian/patches/CVE-2025-4878-1.patch: initialize pointers where
       possible.
     - debian/patches/CVE-2025-4878-2.patch: properly check return value to
       avoid NULL pointer dereference.
     - CVE-2025-4878
   * SECURITY UPDATE: OOB read in sftp_handle function
     - debian/patches/CVE-2025-5318.patch: fix possible buffer overrun.
     - CVE-2025-5318
   * SECURITY UPDATE: Double free in functions exporting keys
     - debian/patches/CVE-2025-5351.patch: avoid double-free on low-memory
       conditions.
     - CVE-2025-5351
   * SECURITY UPDATE: ssh_kdf() returns a success code on certain failures
     - debian/patches/CVE-2025-5372-pre1.patch: Reformat ssh_kdf().
     - debian/patches/CVE-2025-5372.patch: simplify error checking and
       handling of return codes in ssh_kdf().
     - CVE-2025-5372
   * SECURITY UPDATE: Likely read beyond bounds in sftp server message
     decoding
     - debian/patches/CVE-2025-5449-1.patch: avoid memory leak when we run
       out of handles during sftp_open.
     - debian/patches/CVE-2025-5449-2.patch: reproducer for sftp handles
       exhaustion.
     - debian/patches/CVE-2025-5449-3.patch: avoid NULL dereference for
       invalid handles.
     - debian/patches/CVE-2025-5449-4.patch: fix possible read behind buffer
       on 32bit arch.
     - debian/patches/CVE-2025-5449-5.patch: use constant for return values.
     - CVE-2025-5449
   * SECURITY UPDATE: Invalid return code for chacha20 poly1305 with OpenSSL
     backend
     - debian/patches/CVE-2025-5987.patch: correctly detect failures of
       chacha initialization.
     - CVE-2025-5987
   * SECURITY UPDATE: Missing packet filter may expose to variant of
     Terrapin attack
     - debian/patches/missing_packet_filter.patch: implement missing packet
       filter for DH GEX.
     - No CVE number 
 -- Marc Deslauriers <email address hidden>  Mon, 30 Jun 2025 09:40:59 -0400 
         | 
    
    
        
        
            
            
                
                | CVE-2025-5318 | 
                A flaw was found in the libssh library. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that  | 
                 
                
                | CVE-2025-5351 | 
                A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys i | 
                 
                
                | CVE-2025-5372 | 
                A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation | 
                 
             
         | 
        
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates