First published: Fri Oct 28 2022(Updated: )
### Impact Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability. ### Specific Go Packages Affected github.com/cloudflare/cfrpki/cmd/octorpki ### Patches This issue is fixed in v1.4.4 ### Workarounds None.
Credit: cna@cloudflare.com cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/cloudflare/cfrpki | <=1.4.3 | 1.4.4 |
Cloudflare Octorpki | <1.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-3616.
This vulnerability can cause OctoRPKI to exceed its max iterations parameter, leading to a denial of service.
The severity rating for this vulnerability is high, with a value of 7.5.
Attackers can create long chains of CAs to trigger the vulnerability and cause a denial of service.
Yes, a patch is available for this vulnerability in version 1.4.4 of the Cloudflare Octorpki package.