Home

Description

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

PUBLISHED Reserved 2025-05-30 | Published 2025-07-04 | Updated 2026-03-10 | Assigner redhat




MEDIUM: 5.0CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem types

Incorrect Calculation

Product status

Default status
unaffected

Any version before 0.11.2
affected

Default status
affected

0:0.9.6-16.el8_10 (rpm) before *
unaffected

Default status
affected

0:0.9.6-16.el8_10 (rpm) before *
unaffected

Default status
affected

0:0.9.6-3.el9_0.2 (rpm) before *
unaffected

Default status
unaffected

Default status
unknown

Default status
unknown

Default status
affected

Default status
affected

Timeline

2025-05-30:Reported to Red Hat.
2025-06-24:Made public.

References

access.redhat.com/errata/RHSA-2025:21977 (RHSA-2025:21977) vendor-advisory

access.redhat.com/errata/RHSA-2025:23024 (RHSA-2025:23024) vendor-advisory

access.redhat.com/security/cve/CVE-2025-5372 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2369388 (RHBZ#2369388) issue-tracking

cve.org (CVE-2025-5372)

nvd.nist.gov (CVE-2025-5372)

Download JSON