Resolves: RHEL-150661 Resolves: CVE-2025-4877 Resolves: CVE-2025-4878 Resolves: CVE-2025-5351 Resolves: CVE-2025-8114 Resolves: CVE-2025-8277 Resolves: CVE-2026-0964 Resolves: CVE-2026-0965 Resolves: CVE-2026-0966 Resolves: CVE-2026-0967 Resolves: CVE-2026-0968
28 lines
811 B
Diff
28 lines
811 B
Diff
From f9cbbd9359dc17a0388d7b7731546dedb0c34de5 Mon Sep 17 00:00:00 2001
|
|
From: Jakub Jelen <jjelen@redhat.com>
|
|
Date: Tue, 6 May 2025 22:43:31 +0200
|
|
Subject: [PATCH] CVE-2025-5351 pki_crypto: Avoid double-free on low-memory
|
|
conditions
|
|
|
|
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
|
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
---
|
|
src/pki_crypto.c | 1 +
|
|
1 file changed, 1 insertion(+)
|
|
|
|
diff --git a/src/pki_crypto.c b/src/pki_crypto.c
|
|
index b99a6e8c..bde19238 100644
|
|
--- a/src/pki_crypto.c
|
|
+++ b/src/pki_crypto.c
|
|
@@ -2023,6 +2023,7 @@ ssh_string pki_publickey_to_blob(const ssh_key key)
|
|
bignum_safe_free(bn);
|
|
bignum_safe_free(be);
|
|
OSSL_PARAM_free(params);
|
|
+ params = NULL;
|
|
#endif /* OPENSSL_VERSION_NUMBER */
|
|
break;
|
|
}
|
|
--
|
|
2.53.0
|
|
|