Bugzilla – Bug 1206374
VUL-0: CVE-2022-3996: openssl-3: X.509 Policy Constraints Double Locking
Last modified: 2022-12-20 17:25:58 UTC
CVE-2022-3996 https://www.openssl.org/news/secadv/20221213.txt OpenSSL Security Advisory [13 December 2022] ============================================ X.509 Policy Constraints Double Locking (CVE-2022-3996) ======================================================= Severity: Low If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the `-policy' argument to the command line utilities or by calling either `X509_VERIFY_PARAM_add0_policy()' or `X509_VERIFY_PARAM_set1_policies()' functions. OpenSSL versions 3.0.0 to 3.0.7 are vulnerable to this issue. However due to the low severity of this issue we are not creating a new release at this time. The mitigation for this issue can be found in commit 7725e7bfe. OpenSSL 3.0 users should upgrade to OpenSSL 3.0.8 once it is released. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue. This issue was discovered on 7th November 2022 by Polar Bear. The fix was developed by Dr Paul Dale. We have no evidence of this issue being exploited as of the time of release of this advisory (December 13th 2022). References ========== URL for this Security Advisory: https://www.openssl.org/news/secadv/20221213.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html
Upstream commit: * https://github.com/openssl/openssl/commit/4d0340a6d2f327700a059f0b8f954d6160f8eef5
Otto, since there won't be a new release addressing this CVE for the moment, could you apply the patch to both openssl-3 in SLE-15-SP4 and Factory? TIA
Factory submission: https://build.opensuse.org/request/show/1042989
Factory submission: https://build.opensuse.org/request/show/1042989 SLE15-SP4 submission: https://build.suse.de/request/show/286632 No other codestreams affected, assigned back to security team.
Resubmitted SLE15-SP4 because of incomplete patch name in .changes file Factory submission: https://build.opensuse.org/request/show/1042989 SLE15-SP4 submission: https://build.suse.de/request/show/286647
SUSE-SU-2022:4586-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1206374 CVE References: CVE-2022-3786,CVE-2022-3996 JIRA References: Sources used: openSUSE Leap 15.4 (src): openssl-3-3.0.1-150400.4.14.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): openssl-3-3.0.1-150400.4.14.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.