Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10375 | A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string. |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Mon, 28 Jul 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Openssl: rust-openssl use-after-free in `md::fetch` and `cipher::fetch` | Rust-openssl: rust-openssl use-after-free in `md::fetch` and `cipher::fetch` |
Thu, 22 May 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10 |
Tue, 08 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Apr 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string. |
| Title | openssl: rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch` | Openssl: rust-openssl use-after-free in `md::fetch` and `cipher::fetch` |
| First Time appeared |
Redhat
Redhat directory Server Redhat enterprise Linux Redhat openshift Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
|
| CPEs | cpe:/a:redhat:directory_server:11 cpe:/a:redhat:directory_server:12 cpe:/a:redhat:openshift:4 cpe:/a:redhat:trusted_artifact_signer:1 cpe:/a:redhat:trusted_profile_analyzer:1 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat directory Server Redhat enterprise Linux Redhat openshift Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
|
| References |
|
Tue, 08 Apr 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | openssl: rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch` | |
| Weaknesses | CWE-416 | |
| References |
|
|
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-15T04:21:16.475Z
Reserved: 2025-04-07T14:33:50.264Z
Link: CVE-2025-3416
Updated: 2025-04-08T19:02:09.889Z
Status : Awaiting Analysis
Published: 2025-04-08T19:15:53.717
Modified: 2025-04-09T20:02:41.860
Link: CVE-2025-3416
OpenCVE Enrichment
No data.
EUVD