CVE-2023-0466

Source
https://cve.org/CVERecord?id=CVE-2023-0466
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0466.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-0466
Downstream
Related
Published
2023-03-28T15:15:06.880Z
Modified
2026-03-15T22:46:04.107702Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

The function X509VERIFYPARAMadd0policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification.

As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509VERIFYPARAMadd0policy() function.

Instead the applications that require OpenSSL to perform certificate policy check need to use X509VERIFYPARAMset1policies() or explicitly enable the policy check by calling X509VERIFYPARAMsetflags() with the X509VFLAGPOLICYCHECK flag argument.

Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

References

Affected packages

Git / github.com/openssl/openssl

Affected ranges

Type
GIT
Repo
https://github.com/openssl/openssl
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.0.2"
        },
        {
            "fixed": "1.0.2zh"
        },
        {
            "introduced": "1.1.1"
        },
        {
            "fixed": "1.1.1u"
        },
        {
            "introduced": "3.0.0"
        },
        {
            "fixed": "3.0.9"
        },
        {
            "introduced": "3.1.0"
        },
        {
            "fixed": "3.1.1"
        }
    ]
}

Affected versions

Other
OpenSSL_1_0_2u
OpenSSL_1_1_1w
openssl-3.*
openssl-3.0.0
openssl-3.0.1
openssl-3.0.2
openssl-3.0.3
openssl-3.0.4
openssl-3.0.5
openssl-3.0.6
openssl-3.0.7
openssl-3.0.8
openssl-3.1.0
openssl-3.1.0-alpha1
openssl-3.1.0-beta1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0466.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "target": {
            "file": "include/openssl/opensslv.h"
        },
        "source": "https://github.com/openssl/openssl/commit/e04bd3433fd84e1861bf258ea37928d9845e6a86",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "28170854778703993674264004058177114599",
                "73132526844288570625317440636111911761",
                "177405411499435185068645597737938634778",
                "224809958623850711330610094965797758930",
                "295554444428855106393106961197201359586"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2023-0466-c377fa22",
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "crypto/opensslv.h"
        },
        "source": "https://github.com/openssl/openssl/commit/e818b74be2170fbe957a07b0da4401c2b694b3b8",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "251633914150035957322733061977107206211",
                "338514574181828579838011565939158652696",
                "76638288692106140328510055542557597351",
                "142922657400765574308962710386922248045",
                "71649992455794854055653842592139575350",
                "65527166711110472566013424527579064967",
                "253196866009476977787139000804413898733",
                "172177136897997206866313011107384691461"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2023-0466-e051451f",
        "signature_type": "Line"
    }
]