Moderate severityNVD Advisory· Published Oct 28, 2022· Updated May 5, 2025
OctoRPKI crash when maximum iterations number is reached
CVE-2022-3616
Description
Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/cloudflare/cfrpkiGo | < 1.4.4 | 1.4.4 |
Affected products
1- Range: 0
Patches
15f64bcd13477Merge pull request from GHSA-pmw9-567p-68pc
1 file changed · +7 −4
cmd/octorpki/octorpki.go+7 −4 modified@@ -1234,10 +1234,6 @@ func (s *OctoRPKI) validationLoop() { s.stats.Iteration++ iterationsUntilStable++ - // GHSA-g5gj-9ggf-9vmq: Prevent infinite repository traversal - if iterationsUntilStable > *MaxIterations { - log.Fatal("Max iterations has been reached. This number can be adjusted with -max.iterations") - } span.SetTag("iteration", s.stats.Iteration) if *RRDP { @@ -1264,6 +1260,13 @@ func (s *OctoRPKI) validationLoop() { span.SetTag("stable", s.Stable.Load()) span.Finish() + // GHSA-g5gj-9ggf-9vmq: Prevent infinite repository traversal + if iterationsUntilStable > *MaxIterations { + // GHSA-pmw9-567p-68pc: Do not crash when MaxIterations is reached + log.Warning("Max iterations has been reached. Defining current state as stable and stoppping deeper validation. This number can be adjusted with -max.iterations") + s.Stable.Store(true) + } + if *Mode == "oneoff" && s.Stable.Load() { log.Info("Stable, terminating") break
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.