We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service.
Reserved 2025-06-02 | Published 2025-07-25 | Updated 2025-07-25 | Assigner redhatInteger Overflow or Wraparound
2025-06-02: | Reported to Red Hat. |
2025-06-24: | Made public. |
Red Hat would like to thank Ronald Crane for reporting this issue.
access.redhat.com/security/cve/CVE-2025-5449
bugzilla.redhat.com/show_bug.cgi?id=2369705 (RHBZ#2369705)
git.libssh.org/...d=261612179f740bc62ba363d98b3bd5e5573a811f
git.libssh.org/...d=3443aec90188d6aab9282afc80a81df5ab72c4da
git.libssh.org/...d=5504ff40515439a5fecbb17da7483000c4d12eb7
git.libssh.org/...d=78485f446af9b30e37eb8f177b81940710d54496
git.libssh.org/...d=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb
www.libssh.org/security/advisories/CVE-2025-5449.txt
Support options