[Git][security-tracker-team/security-tracker][master] Add Debian bug reference for libssh issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Feb 11 19:40:55 GMT 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
880b7a83 by Salvatore Bonaccorso at 2026-02-11T20:40:29+01:00
Add Debian bug reference for libssh issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,24 +1,24 @@
 CVE-2026-0968 [Denial of Service due to malformed SFTP message]
-	- libssh <unfixed>
+	- libssh <unfixed> (bug #1127693)
 	NOTE: https://www.libssh.org/security/advisories/CVE-2026-0968.txt
 	NOTE: Tests: https://git.libssh.org/projects/libssh.git/commit/?id=212121971fb26e1e00b72bd5402c0454a4d84c03 (libssh-0.11.4)
 	NOTE: Fixed by: https://git.libssh.org/projects/libssh.git/commit/?id=796d85f786dff62bd4bcc4408d9b7bbc855841e9 (libssh-0.11.4)
 CVE-2026-0967 [Denial of Service via inefficient regular expression processing]
-	- libssh <unfixed>
+	- libssh <unfixed> (bug #1127693)
 	NOTE: https://www.libssh.org/security/advisories/CVE-2026-0967.txt
 	NOTE: Fixed by: https://git.libssh.org/projects/libssh.git/commit/?id=6d74aa6138895b3662bade9bd578338b0c4f8a15 (libssh-0.11.4)
 CVE-2026-0966 [Buffer underflow in ssh_get_hexa() on invalid input]
-	- libssh <unfixed>
+	- libssh <unfixed> (bug #1127693)
 	NOTE: https://www.libssh.org/security/advisories/CVE-2026-0966.txt
 	NOTE: Documentation: https://git.libssh.org/projects/libssh.git/commit/?id=3e1d276a5a030938a8f144f46ff4f2a2efe31ced (libssh-0.11.4)
 	NOTE: Tests: https://git.libssh.org/projects/libssh.git/commit/?id=b156391833c66322436cf177d57e10b0325fbcc8 (libssh-0.11.4)
 	NOTE: Fixed by: https://git.libssh.org/projects/libssh.git/commit/?id=6ba5ff1b7b1547a59f750fbc06b89737b7456117 (libssh-0.11.4)
 CVE-2026-0965 [Denial of Service via improper configuration file handling]
-	- libssh <unfixed>
+	- libssh <unfixed> (bug #1127693)
 	NOTE: https://www.libssh.org/security/advisories/CVE-2026-0965.txt
 	NOTE: Fixed by: https://git.libssh.org/projects/libssh.git/commit/?id=bf390a042623e02abc8f421c4c5fadc0429a8a76 (libssh-0.11.4)
 CVE-2026-0964 [Improper sanitation of paths received from SCP servers]
-	- libssh <unfixed>
+	- libssh <unfixed> (bug #1127693)
 	NOTE: https://www.libssh.org/security/advisories/CVE-2026-0964.txt
 	NOTE: Fixed by: https://git.libssh.org/projects/libssh.git/commit/?id=a5e4b12090b0c939d85af4f29280e40c5b6600aa (libssh-0.11.4)
 CVE-2025-14821 [Insecure default configuration leads to local man-in-the-middle attacks on Windows]



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/880b7a83be1dd6e82a94993d184a1c587064fc78

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/880b7a83be1dd6e82a94993d184a1c587064fc78
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260211/48653dc9/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list