Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-0466

Опубликовано: 28 мар. 2023
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS3: 5.3

Описание

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2023.11-5
esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

needed

focal

ignored

end of standard support, was needed
jammy

needed

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needed

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

needed

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.22
devel

released

3.0.8-1ubuntu2
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.27+esm7
esm-infra/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.22
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.18
esm-infra/xenial

released

1.0.2g-1ubuntu4.20+esm7
fips-preview/jammy

released

3.0.2-0ubuntu1.9+Fips1
fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.22
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.18
fips-updates/jammy

released

3.0.2-0ubuntu1.9+Fips1

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.12
devel

DNE

esm-infra/bionic

not-affected

1.0.2n-1ubuntu5.12
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

mantic

DNE

noble

DNE

Показывать по

EPSS

Процентиль: 70%
0.00666
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
около 2 лет назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
nvd
около 2 лет назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVSS3: 5.3
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 5.3
debian
около 2 лет назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicit ...

CVSS3: 5.3
github
около 2 лет назад

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

EPSS

Процентиль: 70%
0.00666
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2023-0466