A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2025-5351 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2369367 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Aug 2025, 13:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:* |
|
First Time |
Redhat
Libssh libssh Redhat enterprise Linux Redhat openshift Container Platform Libssh |
|
References | () https://access.redhat.com/security/cve/CVE-2025-5351 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2369367 - Issue Tracking, Third Party Advisory |
08 Jul 2025, 16:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Jul 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-04 09:15
Updated : 2025-08-22 13:50
NVD link : CVE-2025-5351
Mitre link : CVE-2025-5351
CVE.ORG link : CVE-2025-5351
JSON object : View
Products Affected
libssh
- libssh
redhat
- enterprise_linux
- openshift_container_platform
CWE
CWE-415
Double Free