A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.
{
"sources": [
{
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5351",
"imported": "2025-10-18T14:10:41.583Z",
"id": "CVE-2025-5351",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-5351",
"published": "2025-07-04T09:15:37.100Z",
"modified": "2025-08-22T13:50:58.653Z"
}
],
"license": "CC-BY-4.0"
}