CVE-2025-5351 pki_crypto: Avoid double-free on low-memory conditions

Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
This commit is contained in:
Jakub Jelen
2025-05-06 22:43:31 +02:00
committed by Andreas Schneider
parent b35ee876ad
commit 6ddb730a27

View File

@@ -1632,6 +1632,7 @@ ssh_string pki_key_to_blob(const ssh_key key, enum ssh_key_e type)
bignum_safe_free(bn);
bignum_safe_free(be);
OSSL_PARAM_free(params);
params = NULL;
#endif /* OPENSSL_VERSION_NUMBER */
break;
}
@@ -1803,6 +1804,7 @@ ssh_string pki_key_to_blob(const ssh_key key, enum ssh_key_e type)
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
bignum_safe_free(bd);
OSSL_PARAM_free(params);
params = NULL;
#endif /* OPENSSL_VERSION_NUMBER */
break;
}