If an X.509 certificate contains a malformed policy constraint and
policy processing is enabled, then a write lock will be taken twice
recursively. On some operating systems (most widely: Windows) this
results in a denial of service when the affected process hangs. Policy
processing being enabled on a publicly facing server is not considered
to be a common setup.
Policy processing is enabled by passing the `-policy'
argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
Update (31 March 2023): The description of the policy processing enablement
was corrected based on CVE-2023-0466.
References
Link | Resource |
---|---|
https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7 | Patch Third Party Advisory |
https://www.openssl.org/news/secadv/20221213.txt | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2022-12-13 16:15
Updated : 2023-11-07 03:52
NVD link : CVE-2022-3996
Mitre link : CVE-2022-3996
CVE.ORG link : CVE-2022-3996
JSON object : View
Products Affected
openssl
- openssl
CWE
CWE-667
Improper Locking