A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-10375 A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Mon, 28 Jul 2025 14:00:00 +0000

Type Values Removed Values Added
Title Openssl: rust-openssl use-after-free in `md::fetch` and `cipher::fetch` Rust-openssl: rust-openssl use-after-free in `md::fetch` and `cipher::fetch`

Thu, 22 May 2025 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10

Tue, 08 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Apr 2025 18:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
Title openssl: rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch` Openssl: rust-openssl use-after-free in `md::fetch` and `cipher::fetch`
First Time appeared Redhat
Redhat directory Server
Redhat enterprise Linux
Redhat openshift
Redhat trusted Artifact Signer
Redhat trusted Profile Analyzer
CPEs cpe:/a:redhat:directory_server:11
cpe:/a:redhat:directory_server:12
cpe:/a:redhat:openshift:4
cpe:/a:redhat:trusted_artifact_signer:1
cpe:/a:redhat:trusted_profile_analyzer:1
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat directory Server
Redhat enterprise Linux
Redhat openshift
Redhat trusted Artifact Signer
Redhat trusted Profile Analyzer
References

Tue, 08 Apr 2025 02:00:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title openssl: rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch`
Weaknesses CWE-416
References
Metrics threat_severity

None

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Low


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-15T04:21:16.475Z

Reserved: 2025-04-07T14:33:50.264Z

Link: CVE-2025-3416

cve-icon Vulnrichment

Updated: 2025-04-08T19:02:09.889Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-08T19:15:53.717

Modified: 2025-04-09T20:02:41.860

Link: CVE-2025-3416

cve-icon Redhat

Severity : Low

Publid Date: 2025-04-04T20:31:08Z

Links: CVE-2025-3416 - Bugzilla

cve-icon OpenCVE Enrichment

No data.