diff --git a/crates/openssl-src/RUSTSEC-0000-0000.md b/crates/openssl-src/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..1c3cd37 --- /dev/null +++ b/crates/openssl-src/RUSTSEC-0000-0000.md @@ -0,0 +1,29 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "openssl-src" +aliases = ["CVE-2022-1473"] +cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" +categories = ["crypto-failure"] +date = "2022-05-03" +url = "https://www.openssl.org/news/secadv/20220503.txt" + +[versions] +patched = [">= 300.0.6"] +unaffected = ["< 300.0"] +``` + +# Resource leakage when decoding certificates and keys + +The `OPENSSL_LH_flush()` function, which empties a hash table, contains +a bug that breaks reuse of the memory occupied by the removed hash +table entries. + +This function is used when decoding certificates or keys. If a long lived +process periodically decodes certificates or keys its memory usage will +expand without bounds and the process might be terminated by the operating +system causing a denial of service. Also traversing the empty hash table +entries will take increasingly more time. + +Typically such long lived processes might be TLS clients or TLS servers +configured to accept client certificate authentication.