CVE Vulnerabilities

CVE-2023-6918

Unchecked Return Value

Published: Dec 19, 2023 | Modified: Feb 15, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS 2.x
RedHat/V2
RedHat/V3
3.7 LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.

Weakness

The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.

Affected Software

NameVendorStart VersionEnd Version
LibsshLibssh0.9.0 (including)0.9.8 (excluding)
LibsshLibssh0.10.0 (including)0.10.6 (excluding)
Red Hat Enterprise Linux 8RedHatlibssh-0:0.9.6-14.el8*
Red Hat Enterprise Linux 8RedHatlibssh-0:0.9.6-14.el8*
Red Hat Enterprise Linux 9RedHatlibssh-0:0.10.4-13.el9*
Red Hat Enterprise Linux 9RedHatlibssh-0:0.10.4-13.el9*
LibsshUbuntubionic*
LibsshUbuntuesm-infra/bionic*
LibsshUbuntuesm-infra/focal*
LibsshUbuntuesm-infra/xenial*
LibsshUbuntufocal*
LibsshUbuntujammy*
LibsshUbuntulunar*
LibsshUbuntumantic*
LibsshUbuntutrusty*
LibsshUbuntuupstream*
LibsshUbuntuxenial*

Potential Mitigations

References