Description
A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
References (6)
Core 6
Core References
Vendor Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2025-3416
Issue Tracking issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2357560
Various Sources
https://github.com/sfackler/rust-openssl
Various Sources
https://rustsec.org/advisories/RUSTSEC-2025-0022.html
Issue Tracking
https://github.com/sfackler/rust-openssl/pull/2390
Scores
CVSS v3
3.7
EPSS
0.0045
EPSS Percentile
63.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-416
Status
published
Products (10)
Red Hat/Red Hat Directory Server 11
Red Hat/Red Hat Directory Server 12
Red Hat/Red Hat Enterprise Linux 10
Red Hat/Red Hat Enterprise Linux 6
Red Hat/Red Hat Enterprise Linux 7
Red Hat/Red Hat Enterprise Linux 8
Red Hat/Red Hat Enterprise Linux 9
Red Hat/Red Hat OpenShift Container Platform 4
Red Hat/Red Hat Trusted Artifact Signer
Red Hat/Red Hat Trusted Profile Analyzer
Published
Apr 08, 2025
Tracked Since
Feb 18, 2026