Количество 18
Количество 18

BDU:2023-04973
Уязвимость функции X509_VERIFY_PARAM_add0_policy() библиотеки OpenSSL, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVE-2023-0466
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVE-2023-0466
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVE-2023-0466
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVE-2023-0466
CVE-2023-0466
The function X509_VERIFY_PARAM_add0_policy() is documented to implicit ...
GHSA-pxvj-4wx4-gv6w
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

SUSE-SU-2023:1926-1
Security update for openssl1

SUSE-SU-2023:1922-1
Security update for openssl-1_0_0

SUSE-SU-2023:1914-1
Security update for openssl-1_0_0

SUSE-SU-2023:1911-1
Security update for openssl-1_1

SUSE-SU-2023:1908-1
Security update for openssl-1_1

SUSE-SU-2023:1907-1
Security update for openssl

SUSE-SU-2023:1898-1
Security update for openssl-3

SUSE-SU-2023:1794-1
Security update for openssl-1_1

SUSE-SU-2023:1790-1
Security update for openssl-1_1
ELSA-2023-3722
ELSA-2023-3722: openssl security and bug fix update (MODERATE)
ELSA-2023-12768
ELSA-2023-12768: openssl security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-04973 Уязвимость функции X509_VERIFY_PARAM_add0_policy() библиотеки OpenSSL, позволяющая нарушителю выполнить атаку типа «человек посередине» | CVSS3: 5.3 | 1% Низкий | около 2 лет назад |
![]() | CVE-2023-0466 The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications. | CVSS3: 5.3 | 1% Низкий | около 2 лет назад |
![]() | CVE-2023-0466 The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications. | CVSS3: 5.3 | 1% Низкий | около 2 лет назад |
![]() | CVE-2023-0466 The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications. | CVSS3: 5.3 | 1% Низкий | около 2 лет назад |
![]() | CVSS3: 5.3 | 1% Низкий | около 2 лет назад | |
CVE-2023-0466 The function X509_VERIFY_PARAM_add0_policy() is documented to implicit ... | CVSS3: 5.3 | 1% Низкий | около 2 лет назад | |
GHSA-pxvj-4wx4-gv6w The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications. | CVSS3: 5.3 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1926-1 Security update for openssl1 | около 2 лет назад | ||
![]() | SUSE-SU-2023:1922-1 Security update for openssl-1_0_0 | около 2 лет назад | ||
![]() | SUSE-SU-2023:1914-1 Security update for openssl-1_0_0 | около 2 лет назад | ||
![]() | SUSE-SU-2023:1911-1 Security update for openssl-1_1 | около 2 лет назад | ||
![]() | SUSE-SU-2023:1908-1 Security update for openssl-1_1 | около 2 лет назад | ||
![]() | SUSE-SU-2023:1907-1 Security update for openssl | около 2 лет назад | ||
![]() | SUSE-SU-2023:1898-1 Security update for openssl-3 | около 2 лет назад | ||
![]() | SUSE-SU-2023:1794-1 Security update for openssl-1_1 | около 2 лет назад | ||
![]() | SUSE-SU-2023:1790-1 Security update for openssl-1_1 | около 2 лет назад | ||
ELSA-2023-3722 ELSA-2023-3722: openssl security and bug fix update (MODERATE) | почти 2 года назад | |||
ELSA-2023-12768 ELSA-2023-12768: openssl security update (IMPORTANT) | почти 2 года назад |
Уязвимостей на страницу