Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-5372

Опубликовано: 04 июл. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5

Описание

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

РелизСтатусПримечание
devel

not-affected

0.11.2-1
esm-infra/bionic

needs-triage

esm-infra/focal

needs-triage

esm-infra/xenial

needs-triage

jammy

released

0.9.6-2ubuntu0.22.04.4
noble

released

0.10.6-2ubuntu0.1
oracular

released

0.10.6-3ubuntu1.1
plucky

released

0.11.1-1ubuntu0.1
upstream

released

0.11.2

Показывать по

EPSS

Процентиль: 12%
0.00041
Низкий

5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5
redhat
около 1 месяца назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
nvd
около 1 месяца назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS3: 5
msrc
18 дней назад

Описание отсутствует

CVSS3: 5
debian
около 1 месяца назад

A flaw was found in libssh versions built with OpenSSL versions older ...

CVSS3: 5
github
около 1 месяца назад

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

EPSS

Процентиль: 12%
0.00041
Низкий

5 Medium

CVSS3