发布时间: 2023年4月11日
修改时间: 2024年10月31日
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies() function.
NVD | openEuler | |
---|---|---|
Confidentiality | None | Low |
Attack Vector | Network | Network |
CVSS评分 | 5.3 | 5.6 |
Attack Complexity | Low | High |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | Low | Low |
User Interaction | None | None |
Availability | None | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1995 | openssl security update | 2023年4月11日 |
KylinSec-SA-2024-1493 | nodejs security update | 2024年2月8日 |
KylinSec-SA-2024-1560 | shim security update | 2024年3月1日 |
KylinSec-SA-2024-1572 | nodejs security update | 2024年2月8日 |
KylinSec-SA-2024-3003 | shim security update | 2024年3月1日 |
KylinSec-SA-2024-4768 | edk2 security update | 2025年2月17日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | openssl | Fixed |
KY3.5.2 | openssl | Fixed |
KY3.4-5A | openssl | Fixed |
KY3.5.1 | openssl | Fixed |