Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Wed, 21 May 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:10 |
Fri, 16 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 15 May 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat directory Server Redhat enterprise Linux Redhat openshift Redhat openshift Ai Redhat satellite Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
|
CPEs | cpe:/a:redhat:directory_server:11 cpe:/a:redhat:directory_server:12 cpe:/a:redhat:openshift:4 cpe:/a:redhat:openshift_ai cpe:/a:redhat:satellite:6 cpe:/a:redhat:trusted_artifact_signer:1 cpe:/a:redhat:trusted_profile_analyzer:2 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat directory Server Redhat enterprise Linux Redhat openshift Redhat openshift Ai Redhat satellite Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
Wed, 14 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 13 May 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In crossbeam-channel rust crate, the internal `Channel` type's `Drop` method has a race condition which could, in some circumstances, lead to a double-free that could result in memory corruption. | |
Title | Crossbeam-channel: crossbeam-channel vulnerable to double free on drop | |
Weaknesses | CWE-415 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-26T06:42:35.219Z
Reserved: 2025-05-12T12:06:47.274Z
Link: CVE-2025-4574

Updated: 2025-05-14T13:30:50.043Z

Status : Awaiting Analysis
Published: 2025-05-13T22:15:25.143
Modified: 2025-05-16T14:43:56.797
Link: CVE-2025-4574


No data.