A flaw was found in libsshs handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Libssh | Ubuntu | esm-infra/bionic | * |
| Libssh | Ubuntu | esm-infra/focal | * |
| Libssh | Ubuntu | jammy | * |
| Libssh | Ubuntu | noble | * |
| Libssh | Ubuntu | plucky | * |
| Libssh | Ubuntu | questing | * |
| Libssh | Ubuntu | upstream | * |