A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2025:21977 | |
| https://access.redhat.com/security/cve/CVE-2025-5372 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2369388 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
24 Nov 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-07-04 06:15
Updated : 2025-11-24 21:16
NVD link : CVE-2025-5372
Mitre link : CVE-2025-5372
CVE.ORG link : CVE-2025-5372
JSON object : View
Products Affected
redhat
- openshift_container_platform
- enterprise_linux
libssh
- libssh
CWE
CWE-682
Incorrect Calculation
