A memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. It may allow the attacker to cause OOM leading to a denial of service. The highest threat from this vulnerability is to system availability.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://issues.redhat.com/browse/WFSSL-51 | vendor advisory permissions required |
https://github.com/wildfly-security/wildfly-openssl-natives/pull/4/files | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1885485 | patch vendor advisory issue tracking |
https://security.netapp.com/advisory/ntap-20201016-0004/ | third party advisory |