Intel

AIKIDO-2025-10070

openssl is vulnerable to Use after free

Use after freeGHSA-rpmj-rpgj-qmpm

63

Medium Risk

This Affects:

Rustopenssl
0.10.0 - 0.10.69
Fixed in 0.10.70

TL;DR

Affected versions of this package are affected by a design flaw arising from invalid memory access of the server buffer. The ssl::select_next_proto function returns a slice referencing the server's buffer but with a lifetime tied to the client's buffer. If the server buffer is deallocated first, an attacker can exploit this use-after-free vulnerability to crash the server or leak arbitrary memory contents.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

openssl is vulnerable to Use after free in versions 0.10.0 - 0.10.69.

How to fix this

Upgrade the openssl library to the patch version.