Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5351: Double Free in Red Hat Red Hat Enterprise Linux 10

0
Medium
VulnerabilityCVE-2025-5351cvecve-2025-5351
Published: Fri Jul 04 2025 (07/04/2025, 08:16:47 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.

AI-Powered Analysis

AILast updated: 11/20/2025, 21:38:38 UTC

Technical Analysis

CVE-2025-5351 identifies a double free vulnerability within the libssh library's key export functionality as implemented in Red Hat Enterprise Linux 10. The vulnerability occurs in an internal function responsible for converting cryptographic keys into serialized formats. Specifically, during error handling, a memory structure is freed but not cleared, which can lead to a second free operation if another failure occurs later in the function's execution path. This double free condition can cause heap corruption, potentially leading to application instability or crashes, particularly in low-memory scenarios. The flaw requires network access (AV:N) and low privileges (PR:L) but does not require user interaction (UI:N). The attack complexity is high (AC:H), indicating exploitation is non-trivial. The impact on confidentiality and integrity is low, and availability impact is none, resulting in an overall CVSS score of 4.2 (medium severity). No known exploits have been reported in the wild, and no patches are linked yet, but the issue is publicly disclosed. The vulnerability affects systems performing key export operations using libssh, which is commonly used for secure communications and cryptographic key management in Red Hat Enterprise Linux 10 environments.

Potential Impact

For European organizations, this vulnerability primarily threatens system reliability and stability rather than direct data compromise or service outages. Organizations relying on Red Hat Enterprise Linux 10 for critical infrastructure, secure communications, or cryptographic key management may experience application crashes or heap corruption under specific error conditions, especially when system memory is constrained. This could disrupt automated key export processes or services dependent on libssh, potentially causing operational delays or degraded security posture. Although the confidentiality and integrity impacts are low, repeated crashes or instability could indirectly affect availability and trust in security operations. The medium severity rating suggests that while immediate exploitation risk is limited, the vulnerability should be addressed promptly to maintain system robustness and prevent potential escalation or exploitation in complex attack chains.

Mitigation Recommendations

European organizations should monitor Red Hat security advisories closely and apply patches or updates for Red Hat Enterprise Linux 10 as soon as they become available to address CVE-2025-5351. In the interim, auditing and limiting the use of key export functionality in libssh can reduce exposure. System administrators should review error handling and memory management practices in custom or third-party applications interfacing with libssh to detect and mitigate potential double free conditions. Implementing memory protection mechanisms such as Address Space Layout Randomization (ASLR) and heap integrity checks can help mitigate exploitation impact. Additionally, maintaining sufficient system memory and monitoring for unusual application crashes or instability related to cryptographic operations can aid early detection. Network segmentation and limiting access to services performing key exports can further reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-30T07:01:37.816Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686793516f40f0eb729f9d94

Added to database: 7/4/2025, 8:39:45 AM

Last enriched: 11/20/2025, 9:38:38 PM

Last updated: 12/14/2025, 6:06:31 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats