Missing Release of Memory after Effective Lifetime Affecting openssl Open this link in a new tab package, versions [3.0.0,3.0.3)
Attack Complexity
Low
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-UNMANAGED-OPENSSL-2838977
-
published
19 May 2022
-
disclosed
3 May 2022
-
credit
Aliaksei Levin
Introduced: 3 May 2022
CVE-2022-1473 Open this link in a new tabHow to fix?
Upgrade openssl
to version 3.0.3 or higher.
Overview
Affected versions of this package are vulnerable to Missing Release of Memory after Effective Lifetime in OPENSSL_LH_flush()
. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service.