Description
A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5409-1 | libssh security update |
Ubuntu USN |
USN-6138-1 | libssh vulnerabilities |
References
History
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-03T20:35:18.528Z
Reserved: 2023-04-25T00:00:00.000Z
Link: CVE-2023-2283
No data.
Status : Modified
Published: 2023-05-26T18:15:13.770
Modified: 2025-11-03T21:15:57.297
Link: CVE-2023-2283
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN