Description
A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.
Problem types
Product status
0.10.0 (semver) before 0.11.2
Timeline
| 2025-05-30: | Reported to Red Hat. |
| 2025-06-24: | Made public. |
Credits
Red Hat would like to thank Ronald Crane for reporting this issue.
References
access.redhat.com/security/cve/CVE-2025-5351
bugzilla.redhat.com/show_bug.cgi?id=2369367 (RHBZ#2369367)