-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the missing SSL_SESSION_free() call in the session removal callback. The GitHub patch explicitly adds this call to fix the memory leak (CWE-401). The commit message 'WFSSL-51 sessions not removed correctly' and the added line 'ssl_methods.SSL_SESSION_free(session)' in remove_session_cb directly correlate with the described OOM vulnerability. No other functions were modified in the patch, and the vulnerability description specifically implicates session removal logic.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.wildfly.openssl:wildfly-openssl-natives-parent | maven | < 1.1.3.Final | 1.1.3.Final |
KEV Misses 88% of Exploited CVEs- Get the report