First published: Fri Apr 04 2025(Updated: )
When a `Some(...)` value was passed to the `properties` argument of either of these functions, a use-after-free would result. In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to `CString::drop`'s behavior). The maintainers thank [quitbug](<a href="https://github.com/quitbug/">https://github.com/quitbug/</a>) for reporting this vulnerability to us.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2357560 is a critical vulnerability due to the use-after-free in OpenSSL that can lead to unintended behavior.
To fix REDHAT-BUG-2357560, update to the latest patched version of OpenSSL that resolves this use-after-free issue.
The systems affected by REDHAT-BUG-2357560 include various distributions that utilize the vulnerable versions of OpenSSL.
The potential impacts of REDHAT-BUG-2357560 include application crashes, unexpected behavior, and security risks related to improper handling of cryptographic properties.
The vulnerability REDHAT-BUG-2357560 was reported by a contributor known as quitbug.