openssl-src vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openssl-src package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Use After Free

[300.0.0+3.0.0,)
  • L
Uncontrolled Resource Consumption

[0.0.0,)
  • L
Uncontrolled Resource Consumption ('Resource Exhaustion')

[300.0.0+3.0.0,)
  • M
NULL Pointer Dereference

[,300.2.2+3.2.1)
  • M
Resource Exhaustion

[300.0.0+3.0.0,300.2.2+3.2.1)
  • M
Use of a Broken or Risky Cryptographic Algorithm

[300.0.0+3.0.0,300.2.2+3.2.1)
  • M
Denial of Service (DoS)

[,300.2.0+3.2.0)
  • M
Missing Cryptographic Step

[,300.1.6+3.1.4)
  • M
Denial of Service (DoS)

[111.0.0,111.26.0) [300.0.0,300.1.2)
  • H
Denial of Service (DoS)

[300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[300.0.0,300.0.12)
  • M
Use After Free

[110.0.0,111.25.0) [300.0.0,300.0.12)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[110.0.0,111.25.0) [300.0.0,300.0.12)
  • M
Timing Attack

[110.0.0,111.25.0) [300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[111.0.0,111.25.0) [300.0.0,300.0.12)
  • M
Denial of Service (DoS)

[110.0.0,111.25.0) [300.0.0,300.0.12)
  • H
Buffer Overflow

[300.0.0,300.0.11)
  • H
Buffer Overflow

[300.0.0,300.0.11)
  • M
Cryptographic Issues

[300.0.0,300.0.10)
  • H
Denial of Service (DoS)

[300.0.0,300.0.4)
  • H
Buffer Overflow

[,111.16.0+1.1.1l)
  • H
Buffer Overflow

[,111.16.0+1.1.1l)
  • M
NULL Pointer Dereference

[,1.1.1j)
  • M
NULL Pointer Dereference

[,1.1.1k)
  • L
Improper Certificate Validation

[1.1.1h,1.1.1k)
  • L
Integer Overflow or Wraparound

[,1.1.1j)
  • H
NULL Pointer Dereference

[,111.6.0+1.1.1d)