A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-5351 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2369367 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2025-07-04 09:15
Updated : 2025-08-22 13:50
NVD link : CVE-2025-5351
Mitre link : CVE-2025-5351
CVE.ORG link : CVE-2025-5351
JSON object : View
Products Affected
redhat
- openshift_container_platform
- enterprise_linux
libssh
- libssh
CWE
CWE-415
Double Free
