UBUNTU-CVE-2025-5449

Source
https://ubuntu.com/security/CVE-2025-5449
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-5449.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2025-5449
Upstream
Downstream
Related
Published
2025-06-25T00:00:00Z
Modified
2025-07-31T05:07:36Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.

References

Affected packages

Ubuntu:25.04 / libssh

Package

Name
libssh
Purl
pkg:deb/ubuntu/libssh@0.11.1-1ubuntu0.1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.1-1ubuntu0.1

Affected versions

0.*

0.10.6-3ubuntu1
0.11.1-1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "0.11.1-1ubuntu0.1",
            "binary_name": "libssh-4"
        },
        {
            "binary_version": "0.11.1-1ubuntu0.1",
            "binary_name": "libssh-4-dbgsym"
        },
        {
            "binary_version": "0.11.1-1ubuntu0.1",
            "binary_name": "libssh-dev"
        },
        {
            "binary_version": "0.11.1-1ubuntu0.1",
            "binary_name": "libssh-doc"
        }
    ]
}