Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
5c81cb12
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
未验证
提交
5c81cb12
编写于
3月 31, 2023
作者:
O
openharmony_ci
提交者:
Gitee
3月 31, 2023
浏览文件
操作
浏览文件
下载
差异文件
!99 release3.1分支修复CVE漏洞CVE-2023-0465 CVE-2023-0466
Merge pull request !99 from wanghao-free/OpenHarmony-3.1-Release
上级
64a3d5e7
e47fa4a3
变更
4
隐藏空白更改
内联
并排
Showing
4 changed file
with
22 addition
and
4 deletion
+22
-4
CHANGES
CHANGES
+5
-0
NEWS
NEWS
+1
-0
crypto/x509/x509_vfy.c
crypto/x509/x509_vfy.c
+9
-2
doc/man3/X509_VERIFY_PARAM_set_flags.pod
doc/man3/X509_VERIFY_PARAM_set_flags.pod
+7
-2
未找到文件。
CHANGES
浏览文件 @
5c81cb12
...
...
@@ -9,6 +9,11 @@
Changes between 1.1.1s and 1.1.1t [xx XXX xxxx]
*) Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention
that it does not enable policy checking. Thanks to
David Benjamin for discovering this issue. (CVE-2023-0466)
[Tomas Mraz]
*) Fixed a type confusion vulnerability relating to X.400 address processing
inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING
but subsequently interpreted by GENERAL_NAME_cmp as an ASN1_TYPE. This
...
...
NEWS
浏览文件 @
5c81cb12
...
...
@@ -4,6 +4,7 @@
This file gives a brief overview of the major changes between each OpenSSL
release. For more details please read the CHANGES file.
o Fixed documentation of X509_VERIFY_PARAM_add0_policy() (CVE-2023-0466)
Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021]
...
...
crypto/x509/x509_vfy.c
浏览文件 @
5c81cb12
...
...
@@ -1649,18 +1649,25 @@ static int check_policy(X509_STORE_CTX *ctx)
}
/* Invalid or inconsistent extensions */
if
(
ret
==
X509_PCY_TREE_INVALID
)
{
int
i
;
int
i
,
cbcalled
=
0
;
/* Locate certificates with bad extensions and notify callback. */
for
(
i
=
1
;
i
<
sk_X509_num
(
ctx
->
chain
);
i
++
)
{
for
(
i
=
0
;
i
<
sk_X509_num
(
ctx
->
chain
);
i
++
)
{
X509
*
x
=
sk_X509_value
(
ctx
->
chain
,
i
);
if
(
!
(
x
->
ex_flags
&
EXFLAG_INVALID_POLICY
))
continue
;
cbcalled
=
1
;
if
(
!
verify_cb_cert
(
ctx
,
x
,
i
,
X509_V_ERR_INVALID_POLICY_EXTENSION
))
return
0
;
}
if
(
!
cbcalled
)
{
/* Should not be able to get here */
X509err
(
X509_F_CHECK_POLICY
,
ERR_R_INTERNAL_ERROR
);
return
0
;
}
/* The callback ignored the error so we return success */
return
1
;
}
if
(
ret
==
X509_PCY_TREE_FAILURE
)
{
...
...
doc/man3/X509_VERIFY_PARAM_set_flags.pod
浏览文件 @
5c81cb12
...
...
@@ -92,8 +92,9 @@ B<trust>.
X509_VERIFY_PARAM_set_time() sets the verification time in B<param> to
B<t>. Normally the current time is used.
X509_VERIFY_PARAM_add0_policy() enables policy checking (it is disabled
by default) and adds B<policy> to the acceptable policy set.
X509_VERIFY_PARAM_add0_policy() adds B<policy> to the acceptable policy set.
Contrary to preexisting documentation of this function it does not enable
policy checking.
X509_VERIFY_PARAM_set1_policies() enables policy checking (it is disabled
by default) and sets the acceptable policy set to B<policies>. Any existing
...
...
@@ -377,6 +378,10 @@ and has no effect.
The X509_VERIFY_PARAM_get_hostflags() function was added in OpenSSL 1.1.0i.
The function X509_VERIFY_PARAM_add0_policy() was historically documented as
enabling policy checking however the implementation has never done this.
The documentation was changed to align with the implementation.
=head1 COPYRIGHT
Copyright 2009-2020 The OpenSSL Project Authors. All Rights Reserved.
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录