We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.
Reserved 2025-06-10 | Published 2025-07-07 | Updated 2025-07-07 | Assigner redhat2025-07-03: | Reported to Red Hat. |
2025-04-26: | Made public. |
access.redhat.com/security/cve/CVE-2025-5987
bugzilla.redhat.com/show_bug.cgi?id=2376219 (RHBZ#2376219)
Support options