• CVE-2025-5372

发布时间: 2025年9月5日

修改时间: 2025年9月12日

概要

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

CVSS v3 指标

NVD openEuler
Confidentiality High High
Attack Vector Network Network
CVSS评分 8.8 8.8
Attack Complexity Low Low
Privileges Required Low Low
Scope Unchanged Unchanged
Integrity High High
User Interaction None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2025-2850 libssh security update 2025年9月25日
KylinSec-SA-2025-2863 libssh security update 2025年9月12日

影响产品

产品 状态
KY3.4-5A libssh Fixed
V6 libssh Fixed
KY3.5.3 libssh Fixed
KY3.5.2 libssh Fixed