Missing Release of Memory after Effective Lifetime Affecting openssl Open this link in a new tab package, versions [3.0.0,3.0.3)


0.0
high
  • Attack Complexity

    Low

  • Availability

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-UNMANAGED-OPENSSL-2838977

  • published

    19 May 2022

  • disclosed

    3 May 2022

  • credit

    Aliaksei Levin

How to fix?

Upgrade openssl to version 3.0.3 or higher.

Overview

Affected versions of this package are vulnerable to Missing Release of Memory after Effective Lifetime in OPENSSL_LH_flush(). This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service.