Source: libssh Version: 0.11.3-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]> Control: found -1 0.11.2-1+deb13u1
Hi, The following vulnerabilities were published for libssh. CVE-2026-0964[0]: | Improper sanitation of paths received from SCP servers CVE-2026-0965[1]: | Denial of Service via improper configuration file handling CVE-2026-0966[2]: | Buffer underflow in ssh_get_hexa() on invalid input CVE-2026-0967[3]: | Denial of Service via inefficient regular expression processing CVE-2026-0968[4]: | Denial of Service due to malformed SFTP message If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-0964 https://www.cve.org/CVERecord?id=CVE-2026-0964 [1] https://security-tracker.debian.org/tracker/CVE-2026-0965 https://www.cve.org/CVERecord?id=CVE-2026-0965 [2] https://security-tracker.debian.org/tracker/CVE-2026-0966 https://www.cve.org/CVERecord?id=CVE-2026-0966 [3] https://security-tracker.debian.org/tracker/CVE-2026-0967 https://www.cve.org/CVERecord?id=CVE-2026-0967 [4] https://security-tracker.debian.org/tracker/CVE-2026-0968 https://www.cve.org/CVERecord?id=CVE-2026-0968 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

