Double Free Affecting libssh package, versions <0:0.10.6-1.amzn2023.0.2


Severity

Recommended
0.0
medium
0
10

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Double Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-AMZN2023-LIBSSH-12561821
  • published9 Sept 2025
  • disclosed4 Jul 2025

Introduced: 4 Jul 2025

CVE-2025-5351  (opens in a new tab)
CWE-415  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 libssh to version 0:0.10.6-1.amzn2023.0.2 or higher.
This issue was patched in ALAS2023-2025-1155.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libssh package and not the libssh package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

A flaw was found in the key export functionality of libssh. The issue occurs in the internal function responsible for converting cryptographic keys into serialized formats. During error handling, a memory structure is freed but not cleared, leading to a potential double free issue if an additional failure occurs later in the function. This condition may result in heap corruption or application instability in low-memory scenarios, posing a risk to system reliability where key export operations are performed.

CVSS Base Scores

version 3.1