CVE-2022-3786
Description
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openssl-srccrates.io | >= 300.0.0, < 300.0.11 | 300.0.11 |
Affected products
6cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
Patches
48c1dd95f3cc519cc035b6c6f4a31c14f31e1Bump to OpenSSL 3.0.7
2 files changed · +2 −2
Cargo.toml+1 −1 modified@@ -1,6 +1,6 @@ [package] name = "openssl-src" -version = "300.0.10+3.0.6" +version = "300.0.11+3.0.7" authors = ["Alex Crichton <alex@alexcrichton.com>"] license = "MIT/Apache-2.0" readme = "README.md"
openssl+1 −1 modified@@ -1 +1 @@ -Subproject commit 75a6bc17f32505421a78476a972d4d9b74f303b6 +Subproject commit 19cc035b6c6f2283573d29c7ea7f7d675cf750ce
fe3b639dc19bFix CVE-2022-3602 in punycode decoder.
1 file changed · +1 −1
crypto/punycode.c+1 −1 modified@@ -181,7 +181,7 @@ int ossl_punycode_decode(const char *pEncoded, const size_t enc_len, n = n + i / (written_out + 1); i %= (written_out + 1); - if (written_out > max_out) + if (written_out >= max_out) return 0; memmove(pDecoded + i + 1, pDecoded + i,
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
49- github.com/advisories/GHSA-h8jm-2x53-xhp5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-3786ghsaADVISORY
- www.openssl.org/news/secadv/20221101.txtnvdVendor AdvisoryWEB
- packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.htmlghsaWEB
- www.openwall.com/lists/oss-security/2022/11/01/15ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/01/16ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/01/17ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/01/18ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/01/19ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/01/20ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/01/21ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/01/24ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/1ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/10ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/11ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/12ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/13ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/14ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/15ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/2ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/3ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/5ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/6ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/7ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/02/9ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/03/1ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/03/10ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/03/11ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/03/2ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/03/3ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/03/5ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/03/6ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/03/7ghsaWEB
- www.openwall.com/lists/oss-security/2022/11/03/9ghsaWEB
- github.com/alexcrichton/openssl-src-rs/commit/4a31c14f31e1a08c18893a37e304dd1dd4b7daa3ghsaWEB
- github.com/openssl/openssl/commit/fe3b639dc19b325846f4f6801f2f4604f56e3de3ghsaWEB
- github.com/rustsec/advisory-db/pull/1452ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6SghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITSghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6SghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITSghsaWEB
- psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023ghsaWEB
- rustsec.org/advisories/RUSTSEC-2022-0065.htmlghsaWEB
- security.gentoo.org/glsa/202211-01ghsaWEB
- security.netapp.com/advisory/ntap-20221102-0001ghsaWEB
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2aghsaWEB
- www.kb.cert.org/vuls/id/794340nvdWEB
- cert-portal.siemens.com/productcert/html/ssa-408105.htmlnvd
- www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.htmlnvd
News mentions
0No linked articles in our index yet.