DEBIAN-CVE-2025-8277

Source
https://security-tracker.debian.org/tracker/CVE-2025-8277
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-8277.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-8277
Upstream
Published
2025-09-09T12:15:30Z
Modified
2025-10-14T04:27:00.417895Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

References

Affected packages

Debian:11 / libssh

Package

Name
libssh
Purl
pkg:deb/debian/libssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.9.5-1
0.9.5-1+deb11u1
0.9.6-1
0.9.6-2
0.9.7-0+deb11u1
0.9.8-0+deb11u1
0.10.4-1
0.10.4-2
0.10.5-1
0.10.5-2
0.10.5-3
0.10.5-3+hurd.1
0.10.6-1
0.10.6-2
0.10.6-3
0.11.1-1
0.11.1-2
0.11.2-1
0.11.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libssh

Package

Name
libssh
Purl
pkg:deb/debian/libssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.10.5-2
0.10.5-3
0.10.5-3+hurd.1
0.10.6-0+deb12u1
0.10.6-1
0.10.6-2
0.10.6-3
0.11.1-1
0.11.1-2
0.11.2-1
0.11.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libssh

Package

Name
libssh
Purl
pkg:deb/debian/libssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.11.2-1
0.11.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / libssh

Package

Name
libssh
Purl
pkg:deb/debian/libssh?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.3-1

Affected versions

0.*

0.11.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}