Source: libssh
Version: 0.11.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 0.11.2-1+deb13u1

Hi,

The following vulnerabilities were published for libssh.

CVE-2026-0964[0]:
| Improper sanitation of paths received from SCP servers


CVE-2026-0965[1]:
| Denial of Service via improper configuration file handling


CVE-2026-0966[2]:
| Buffer underflow in ssh_get_hexa() on invalid input


CVE-2026-0967[3]:
| Denial of Service via inefficient regular expression processing


CVE-2026-0968[4]:
| Denial of Service due to malformed SFTP message


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-0964
    https://www.cve.org/CVERecord?id=CVE-2026-0964
[1] https://security-tracker.debian.org/tracker/CVE-2026-0965
    https://www.cve.org/CVERecord?id=CVE-2026-0965
[2] https://security-tracker.debian.org/tracker/CVE-2026-0966
    https://www.cve.org/CVERecord?id=CVE-2026-0966
[3] https://security-tracker.debian.org/tracker/CVE-2026-0967
    https://www.cve.org/CVERecord?id=CVE-2026-0967
[4] https://security-tracker.debian.org/tracker/CVE-2026-0968
    https://www.cve.org/CVERecord?id=CVE-2026-0968

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to