libssh/SOURCES/CVE-2025-5351.patch
2026-03-30 10:41:05 -04:00

28 lines
811 B
Diff

From f9cbbd9359dc17a0388d7b7731546dedb0c34de5 Mon Sep 17 00:00:00 2001
From: Jakub Jelen <jjelen@redhat.com>
Date: Tue, 6 May 2025 22:43:31 +0200
Subject: [PATCH] CVE-2025-5351 pki_crypto: Avoid double-free on low-memory
conditions
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
---
src/pki_crypto.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/src/pki_crypto.c b/src/pki_crypto.c
index b99a6e8c..bde19238 100644
--- a/src/pki_crypto.c
+++ b/src/pki_crypto.c
@@ -2023,6 +2023,7 @@ ssh_string pki_publickey_to_blob(const ssh_key key)
bignum_safe_free(bn);
bignum_safe_free(be);
OSSL_PARAM_free(params);
+ params = NULL;
#endif /* OPENSSL_VERSION_NUMBER */
break;
}
--
2.53.0