If an X.509 certificate contains a malformed policy constraint and
policy processing is enabled, then a write lock will be taken twice
recursively. On some operating systems (most widely: Windows) this
results in a denial of service when the affected process hangs. Policy
processing being enabled on a publicly facing server is not considered
to be a common setup.
Policy processing is enabled by passing the `-policy'
argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
Update (31 March 2023): The description of the policy processing enablement
was corrected based on CVE-2023-0466.
References
Link | Resource |
---|---|
https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7 | Patch Third Party Advisory |
https://www.openssl.org/news/secadv/20221213.txt | Vendor Advisory |
Configurations
History
07 Nov 2023, 03:52
Type | Values Removed | Values Added |
---|---|---|
Summary | If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466. |
31 Mar 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
Summary | If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466. |
15 Dec 2022, 17:46
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-667 | |
First Time |
Openssl
Openssl openssl |
|
CPE | cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7 - Patch, Third Party Advisory | |
References | (MISC) https://www.openssl.org/news/secadv/20221213.txt - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
13 Dec 2022, 16:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-13 16:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-3996
Mitre link : CVE-2022-3996
CVE.ORG link : CVE-2022-3996
JSON object : View
Products Affected
openssl
- openssl
CWE
CWE-667
Improper Locking