Missing Release of Memory after Effective Lifetime Affecting openssl Open this link in a new tab package, versions [3.0.0,3.0.3)

  • Attack Complexity


  • Availability


Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id


  • published

    19 May 2022

  • disclosed

    3 May 2022

  • credit

    Aliaksei Levin

How to fix?

Upgrade openssl to version 3.0.3 or higher.


Affected versions of this package are vulnerable to Missing Release of Memory after Effective Lifetime in OPENSSL_LH_flush(). This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service.