Vulnerability Description
A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2026:18683
- https://access.redhat.com/security/cve/CVE-2025-8277
- https://bugzilla.redhat.com/show_bug.cgi?id=2383888
- https://www.libssh.org/security/advisories/CVE-2025-8277.txt
FAQ
What is CVE-2025-8277?
CVE-2025-8277 is a vulnerability with a CVSS score of 3.1 (LOW). A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gr...
How severe is CVE-2025-8277?
CVE-2025-8277 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-8277?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.