Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-3416

Опубликовано: 08 апр. 2025
Источник: debian
EPSS Низкий

Описание

A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rust-opensslfixed0.10.72-1package
rust-opensslno-dsabookwormpackage
rust-opensslpostponedbullseyepackage

Примечания

  • https://rustsec.org/advisories/RUSTSEC-2025-0022.html

  • https://github.com/sfackler/rust-openssl/pull/2390

  • https://github.com/sfackler/rust-openssl/commit/87085bd67896b7f92e6de35d081f607a334beae4

EPSS

Процентиль: 22%
0.00072
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
7 месяцев назад

A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.

CVSS3: 3.7
redhat
7 месяцев назад

A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.

CVSS3: 3.7
nvd
7 месяцев назад

A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.

msrc
2 месяца назад

Rust-openssl: rust-openssl use-after-free in `md::fetch` and `cipher::fetch`

suse-cvrf
6 месяцев назад

Security update for kanidm

EPSS

Процентиль: 22%
0.00072
Низкий