{"id":"JLSEC-2025-97","summary":"A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ...","details":"A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.","modified":"2025-11-25T22:13:13.470832Z","published":"2025-10-19T18:40:48.457Z","upstream":["CVE-2025-5372"],"database_specific":{"license":"CC-BY-4.0","sources":[{"modified":"2025-11-24T21:16:03.960Z","imported":"2025-11-25T21:57:29.294Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5372","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-5372","id":"CVE-2025-5372","published":"2025-07-04T06:15:24.930Z"}]},"references":[{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:21977"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-5372"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369388"}],"affected":[{"package":{"name":"libssh_jll","ecosystem":"Julia","purl":"pkg:julia/libssh_jll?uuid=a8d4f100-aa25-5708-be18-96e0805c2c9d"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.11.3+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-97.json"}}],"schema_version":"1.7.3"}