CVE-2025-24898Use After Free in Openssl

CWE-416Use After Free11 documents8 sources
Severity
6.3MEDIUMNVD
OSV9.1
EPSS
0.1%
top 68.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 3
Latest updateJan 18

Description

rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer's lifetime is shorter than the `client` buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. The crate`openssl` version 0.10.70 fixes the sig

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages11 packages

debiandebian/rust-openssl< rust-openssl 0.10.29-1+deb11u1 (bullseye)
Debianrust-openssl_project/rust-openssl< 0.10.29-1+deb11u1+2
Ubunturust-openssl_project/rust-openssl< 0.10.23-1ubuntu0.1~esm1+2
CVEListV5sfackler/rust-openssl>= 0.10.0, < 0.10.70
crates.ioopenssl/openssl0.10.00.10.70+1

🔴Vulnerability Details

5
OSV
rust-openssl vulnerabilities2025-11-26
OSV
CVE-2025-24898: rust-openssl is a set of OpenSSL bindings for the Rust programming language2025-02-03
GHSA
rust-openssl ssl::select_next_proto use after free2025-02-03
OSV
rust-openssl ssl::select_next_proto use after free2025-02-03
OSV
ssl::select_next_proto use after free2025-02-02

📋Vendor Advisories

4
Ubuntu
rust-openssl vulnerabilities2025-11-26
Microsoft
rust openssl ssl::select_next_proto use after free2025-02-11
Red Hat
rust-openssl: rust openssl ssl::select_next_proto use after free2025-02-03
Debian
CVE-2025-24898: rust-openssl - rust-openssl is a set of OpenSSL bindings for the Rust programming language. In ...2025

📄Research Papers

1
arXiv
SandCell: Sandboxing Rust Beyond Unsafe Code2026-01-18
CVE-2025-24898 — Use After Free in Openssl | cvebase