CVE-2025-5372

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

24 Nov 2025, 21:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:21977 -

Information

Published : 2025-07-04 06:15

Updated : 2025-11-24 21:16


NVD link : CVE-2025-5372

Mitre link : CVE-2025-5372

CVE.ORG link : CVE-2025-5372


JSON object : View

Products Affected

redhat

  • openshift_container_platform
  • enterprise_linux

libssh

  • libssh
CWE
CWE-682

Incorrect Calculation