{"id":"CVE-2022-3996","details":"If an X.509 certificate contains a malformed policy constraint and\npolicy processing is enabled, then a write lock will be taken twice\nrecursively.  On some operating systems (most widely: Windows) this\nresults in a denial of service when the affected process hangs.  Policy\nprocessing being enabled on a publicly facing server is not considered\nto be a common setup.\n\nPolicy processing is enabled by passing the `-policy'\nargument to the command line utilities or by calling the\n`X509_VERIFY_PARAM_set1_policies()' function.\n\nUpdate (31 March 2023): The description of the policy processing enablement\nwas corrected based on CVE-2023-0466.","aliases":["GHSA-vr8j-hgmm-jh9r"],"modified":"2026-04-12T01:27:58.769604Z","published":"2022-12-13T16:15:22.007Z","related":["CGA-vj4x-mwvp-c5pq","SUSE-SU-2022:4586-1","openSUSE-SU-2024:12573-1"],"references":[{"type":"ADVISORY","url":"https://www.openssl.org/news/secadv/20221213.txt"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230203-0003/"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"89cd17a031e022211684eb7eb41190cf1910f9fa"},{"last_affected":"19cc035b6c6f2283573d29c7ea7f7d675cf750ce"},{"fixed":"7725e7bfe6f2ce8146b6552b44e0d226be7638e7"}],"database_specific":{"versions":[{"introduced":"3.0.0"},{"last_affected":"3.0.7"}]}}],"versions":["openssl-3.0.0","openssl-3.0.1","openssl-3.0.2","openssl-3.0.3","openssl-3.0.4","openssl-3.0.5","openssl-3.0.6","openssl-3.0.7"],"database_specific":{"vanir_signatures":[{"id":"CVE-2022-3996-383cac48","source":"https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7","signature_version":"v1","deprecated":false,"target":{"file":"crypto/x509/pcy_map.c"},"signature_type":"Line","digest":{"line_hashes":["279575523795296330294593989038263856970","328228967788405492778462705417817613235","48604254952751100308328289785600103687","106056911410713250346668559786984267083","172779517063998759931966698215728748829","58100369142781113603802418888053424532","45598401082326268789446081927995096398"],"threshold":0.9}},{"id":"CVE-2022-3996-c5cfac45","source":"https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7","signature_version":"v1","deprecated":false,"target":{"function":"ossl_policy_cache_set_mapping","file":"crypto/x509/pcy_map.c"},"signature_type":"Function","digest":{"length":1370,"function_hash":"251752733737737008454248314611164806237"}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3996.json","vanir_signatures_modified":"2026-04-12T01:27:58Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}