Wind River Support Network

Meet the Support Network

Home CVE Database CVE-2023-0466

CVE-2023-0466

Description

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

Priority: LOW
CVSS v3: 5.3
Component: openssl
Publish Date: Mar 22, 2023
Related ID: --
CVSS v2: MEDIUM
Modified Date: Mar 22, 2023

Find out more about CVE-2023-0466 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Linux
Wind River Linux LTS 17 Requires LTSS -- -- --
Wind River Linux 8 Requires LTSS -- -- --
Wind River Linux 9 Requires LTSS -- -- --
Wind River Linux 7 Requires LTSS -- -- --
Wind River Linux LTS 21 Fixed LIN1021-5462
10.21.20.19 --
Wind River Linux LTS 22 Fixed LIN1022-3707
10.22.33.9 --
Wind River Linux LTS 18 Fixed LIN1018-10496
10.18.44.30 --
Wind River Linux LTS 19 Fixed LIN1019-9603
10.19.45.29 --
Wind River Linux CD release Not Vulnerable -- -- --
Wind River Linux 6 Requires LTSS -- -- --
Wind River Linux LTS 23 Fixed LIN1023-116
10.23.30.1 --
VxWorks
VxWorks 7 Fixed -- 23.09 --
VxWorks 6.9 Fixed -- 6.9.4.12 RCPL7 --
Helix Virtualization Platform Cert Edition
Helix Virtualization Platform Cert Edition Not Vulnerable -- -- --

Related Products

Product Name Status Defect Fixed Downloads

Notes
Requires LTSS - customers must have active LTSS (Long Term Security Shield) Support to receive up-to-date information about vulnerabilities that may affect legacy software. Please contact your Wind River account team or see https://docs.windriver.com/bundle/Support_and_Maintenance_Supplemental_Terms_and_Conditions and https://support2.windriver.com/index.php?page=plc for more information.
Live chat
Online