CVE-2025-5372

Name
CVE-2025-5372
Description
A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vdb-entry https://access.redhat.com/security/cve/CVE-2025-5372
issue-tracking https://bugzilla.redhat.com/show_bug.cgi?id=2369388

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:* libssh >= None < 0.11.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
libssh edge-community 0.11.2-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
libssh 3.22-community 0.11.2-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
libssh edge-community 0.11.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
libssh 3.22-community 0.11.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable