First published: Wed Jan 25 2023(Updated: )
A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer.
Credit: openssl-security@openssl.org openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1:3.0.1-47.el9_1 | 1:3.0.1-47.el9_1 |
redhat/openssl | <1:3.0.1-46.el9_0 | 1:3.0.1-46.el9_0 |
OpenSSL OpenSSL | >=3.0.0<3.0.8 | |
rust/openssl-src | >=300.0.0<300.0.12 | 300.0.12 |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4203 is a vulnerability in OpenSSL that allows a read buffer overrun in X.509 certificate verification.
CVE-2022-4203 occurs during name constraint checking in X.509 certificate verification.
The severity of CVE-2022-4203 is medium with a severity value of 4.9.
OpenSSL versions 3.0.0 to 3.0.8 are affected by CVE-2022-4203.
To fix CVE-2022-4203, update OpenSSL to version 3.0.1-47.el9_1 or higher.