Home

Description

A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash.

PUBLISHED Reserved 2025-07-24 | Published 2025-07-24 | Updated 2026-01-22 | Assigner redhat




MEDIUM: 4.7CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem types

NULL Pointer Dereference

Product status

Default status
unaffected

Any version before 0.11.3
affected

Default status
affected

Default status
unaffected

Default status
unaffected

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-07-24:Reported to Red Hat.
2025-07-24:Made public.

Credits

Red Hat would like to thank Jakub Jelen and Philippe Antoine for reporting this issue.

References

access.redhat.com/security/cve/CVE-2025-8114 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2383220 (RHBZ#2383220) issue-tracking

git.libssh.org/...d=53ac23ded4cb2c5463f6c4cd1525331bd578812d

git.libssh.org/projects/libssh.git/commit/?id=65f363c9

www.libssh.org/security/advisories/CVE-2025-8114.txt

cve.org (CVE-2025-8114)

nvd.nist.gov (CVE-2025-8114)

Download JSON