A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2025-5372 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2369388 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Aug 2025, 14:01
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat
Libssh libssh Redhat enterprise Linux Redhat openshift Container Platform Libssh |
|
References | () https://access.redhat.com/security/cve/CVE-2025-5372 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2369388 - Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:* |
08 Jul 2025, 16:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Jul 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-04 06:15
Updated : 2025-08-22 14:01
NVD link : CVE-2025-5372
Mitre link : CVE-2025-5372
CVE.ORG link : CVE-2025-5372
JSON object : View
Products Affected
libssh
- libssh
redhat
- enterprise_linux
- openshift_container_platform
CWE
CWE-682
Incorrect Calculation