openssl-src vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openssl-src package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

[300.0.0+3.0.0,)
  • L
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0.0.0,)
  • L
Uncontrolled Resource Consumption ('Resource Exhaustion')

[300.0.0+3.0.0,)
  • M
NULL Pointer Dereference

[,300.2.2+3.2.1)
  • M
Resource Exhaustion

[300.0.0+3.0.0,300.2.2+3.2.1)
  • M
Use of a Broken or Risky Cryptographic Algorithm

[300.0.0+3.0.0,300.2.2+3.2.1)
  • M
Denial of Service (DoS)

[,300.2.0+3.2.0)
  • M
Missing Cryptographic Step

[,300.1.6+3.1.4)
  • M
Denial of Service (DoS)

[111.0.0,111.26.0)[300.0.0,300.1.2)
  • H
Denial of Service (DoS)

[300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[300.0.0,300.0.12)
  • M
Use After Free

[110.0.0,111.25.0)[300.0.0,300.0.12)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[110.0.0,111.25.0)[300.0.0,300.0.12)
  • M
Timing Attack

[110.0.0,111.25.0)[300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[111.0.0,111.25.0)[300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[110.0.0,111.25.0)[300.0.0,300.0.12)
  • H
Buffer Overflow

[300.0.0,300.0.11)
  • H
Buffer Overflow

[300.0.0,300.0.11)
  • M
Cryptographic Issues

[300.0.0,300.0.10)
  • H
Denial of Service (DoS)

[300.0.0,300.0.4)
  • H
Buffer Overflow

[,111.16.0+1.1.1l)
  • H
Buffer Overflow

[,111.16.0+1.1.1l)
  • M
NULL Pointer Dereference

[,1.1.1j)
  • M
NULL Pointer Dereference

[,1.1.1k)
  • L
Improper Certificate Validation

[1.1.1h,1.1.1k)
  • L
Integer Overflow or Wraparound

[,1.1.1j)
  • H
NULL Pointer Dereference

[,111.6.0+1.1.1d)