diff options
author | Tomas Mraz <tomas@openssl.org> | 2023-03-21 16:15:47 +0100 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-03-28 13:43:04 +0200 |
commit | 5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5 (patch) | |
tree | e271e1895b6bd190adefc882d658a0baa19a9310 /CHANGES.md | |
parent | 986f9a674d49d1e13459e04bd721237c721c44f4 (diff) |
Fix documentation of X509_VERIFY_PARAM_add0_policy()
The function was incorrectly documented as enabling policy checking.
Fixes: CVE-2023-0466
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20561)
Diffstat (limited to 'CHANGES.md')
-rw-r--r-- | CHANGES.md | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/CHANGES.md b/CHANGES.md index 04eb3b2202..253f2fd823 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -242,6 +242,13 @@ OpenSSL 3.1 ### Changes between 3.1.0 and 3.1.1 [xx XXX xxxx] + * Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention + that it does not enable policy checking. Thanks to David Benjamin for + discovering this issue. + ([CVE-2023-0466]) + + *Tomáš Mráz* + * Fixed an issue where invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert @@ -19901,6 +19908,7 @@ ndif <!-- Links --> +[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466 [CVE-2023-0465]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0465 [CVE-2023-0464]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0464 [CVE-2023-0401]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0401 |