Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-21977

Опубликовано: 24 нояб. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-21977: libssh security update (MODERATE)

[0.9.6-16]

  • Fix CVE-2025-5372 Resolves: RHEL-121232

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

libssh-devel

0.9.6-16.el8_10

libssh

0.9.6-16.el8_10

libssh-config

0.9.6-16.el8_10

Oracle Linux x86_64

libssh-devel

0.9.6-16.el8_10

libssh

0.9.6-16.el8_10

libssh-config

0.9.6-16.el8_10

Связанные CVE

Связанные уязвимости

CVSS3: 5
ubuntu
5 месяцев назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
redhat
5 месяцев назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
nvd
5 месяцев назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
msrc
5 месяцев назад

Libssh: incorrect return code handling in ssh_kdf() in libssh

CVSS3: 5
debian
5 месяцев назад

A flaw was found in libssh versions built with OpenSSL versions older ...