A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Apr 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string. |
Title | openssl: rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch` | Openssl: rust-openssl use-after-free in `md::fetch` and `cipher::fetch` |
First Time appeared |
Redhat
Redhat directory Server Redhat enterprise Linux Redhat openshift Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
|
CPEs | cpe:/a:redhat:directory_server:11 cpe:/a:redhat:directory_server:12 cpe:/a:redhat:openshift:4 cpe:/a:redhat:trusted_artifact_signer:1 cpe:/a:redhat:trusted_profile_analyzer:1 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat directory Server Redhat enterprise Linux Redhat openshift Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
|
References |
|
Tue, 08 Apr 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | openssl: rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch` | |
Weaknesses | CWE-416 | |
References |
|
|
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-08T19:02:13.881Z
Reserved: 2025-04-07T14:33:50.264Z
Link: CVE-2025-3416

Updated: 2025-04-08T19:02:09.889Z

Status : Awaiting Analysis
Published: 2025-04-08T19:15:53.717
Modified: 2025-04-09T20:02:41.860
Link: CVE-2025-3416
