CVE-2025-5372
Libssh: incorrect return code handling in ssh_kdf() in libssh
Published:
7/4/2025
Last updated:
4/7/2026
Reserved:
5/30/2025
A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
CNA assigner:
redhat (53f830b8-0a3f-465b-8143-3b8a9948e749)
Requested by:
n/a
Opam packages affected (1)
libssh
Products affected (10)
| Product |
Vendor |
Version |
| Red Hat Enterprise Linux 9 |
Red Hat
|
n/a
|
| Red Hat Enterprise Linux 8 |
Red Hat
|
n/a
|
| Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions |
Red Hat
|
n/a
|
| Red Hat Enterprise Linux 8 |
Red Hat
|
n/a
|
| Red Hat Enterprise Linux 8 |
Red Hat
|
n/a
|
| Red Hat Enterprise Linux 8 |
Red Hat
|
n/a
|
| libssh |
libssh
|
n/a
|
| Red Hat Enterprise Linux 7 |
Red Hat
|
n/a
|
| Red Hat Enterprise Linux 6 |
Red Hat
|
n/a
|
| Red Hat OpenShift Container Platform 4 |
Red Hat
|
n/a
|