We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5987

Libssh: invalid return code for chacha20 poly1305 with openssl backend



Description

A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.

Reserved 2025-06-10 | Published 2025-07-07 | Updated 2025-07-07 | Assigner redhat


MEDIUM: 5.0CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem types

Return of Wrong Status Code

Product status

Default status
affected

Default status
unknown

Default status
unknown

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-07-03:Reported to Red Hat.
2025-04-26:Made public.

References

access.redhat.com/security/cve/CVE-2025-5987 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2376219 (RHBZ#2376219) issue-tracking

cve.org (CVE-2025-5987)

nvd.nist.gov (CVE-2025-5987)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5987

Support options

Helpdesk Chat, Email, Knowledgebase