Description
A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.
INFO
Published Date :
2025-07-04T06:01:27.954Z
Last Modified :
2026-04-07T08:30:28.136Z
Source :
redhat
AFFECTED PRODUCTS
The following products are affected by CVE-2025-5372 vulnerability.
| Vendors | Products |
|---|---|
| Libssh |
|
| Redhat |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-5372.