We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-24898

rust openssl ssl::select_next_proto use after free



Description

rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer's lifetime is shorter than the `client` buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. The crate`openssl` version 0.10.70 fixes the signature of `ssl::select_next_proto` to properly constrain the output buffer's lifetime to that of both input buffers. Users are advised to upgrade. In standard usage of `ssl::select_next_proto` in the callback passed to `SslContextBuilder::set_alpn_select_callback`, code is only affected if the `server` buffer is constructed *within* the callback.

Reserved 2025-01-27 | Published 2025-02-03 | Updated 2025-02-03 | Assigner GitHub_M


MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-416: Use After Free

Product status

>= 0.10.0, < 0.10.70
affected

References

github.com/...penssl/security/advisories/GHSA-rpmj-rpgj-qmpm

github.com/sfackler/rust-openssl/pull/2360

crates.io/crates/openssl

cve.org (CVE-2025-24898)

nvd.nist.gov (CVE-2025-24898)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-24898

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.