The function X509_VERIFY_PARAM_add0_policy() is documented to
implicitly enable the certificate policy check when doing certificate
verification. However the implementation of the function does not
enable the check which allows certificates with invalid or incorrect
policies to pass the certificate verification.

As suddenly enabling the policy check could break existing deployments it was
decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()
function.

Instead the applications that require OpenSSL to perform certificate
policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly
enable the policy check by calling X509_VERIFY_PARAM_set_flags() with
the X509_V_FLAG_POLICY_CHECK flag argument.

Certificate policy checks are disabled by default in OpenSSL and are not
commonly used by applications.
History

Sat, 01 Mar 2025 02:30:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Low

threat_severity

Moderate


Wed, 19 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: openssl

Published:

Updated: 2025-02-19T17:12:25.801Z

Reserved: 2023-01-24T13:52:42.631Z

Link: CVE-2023-0466

cve-icon Vulnrichment

Updated: 2024-08-02T05:10:56.167Z

cve-icon NVD

Status : Modified

Published: 2023-03-28T15:15:06.880

Modified: 2025-02-19T18:15:22.177

Link: CVE-2023-0466

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-03-28T00:00:00Z

Links: CVE-2023-0466 - Bugzilla

cve-icon OpenCVE Enrichment

No data.