Bug 1301691 - openssl: verify function ignores X509_V_ERR_INVALID_PURPOSE in verify callback
Summary: openssl: verify function ignores X509_V_ERR_INVALID_PURPOSE in verify callback
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1301692
TreeView+ depends on / blocked
 
Reported: 2016-01-25 17:19 UTC by Adam Mariš
Modified: 2021-06-01 14:54 UTC (History)
25 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-03-24 06:45:51 UTC


Attachments (Terms of Use)
Proposed upstream patch 1 (1.82 KB, patch)
2016-02-15 16:29 UTC, Adam Mariš
no flags Details | Diff
Proposed upstream patch 2 (1.84 KB, patch)
2016-02-15 16:29 UTC, Adam Mariš
no flags Details | Diff
Proposed upstream patch 3 (11.24 KB, patch)
2016-02-15 16:30 UTC, Adam Mariš
no flags Details | Diff
Proposed upstream patch 4 (6.88 KB, patch)
2016-02-15 16:30 UTC, Adam Mariš
no flags Details | Diff

Description Adam Mariš 2016-01-25 17:19:15 UTC
It was reported that openssl verify function ignores X509_V_ERR_INVALID_PURPOSE in its verify callback when verifying root and intermediate certificates with extended key
usage extension.

Comment 3 Adam Mariš 2016-02-15 16:29:22 UTC
Created attachment 1127332 [details]
Proposed upstream patch 1

Comment 4 Adam Mariš 2016-02-15 16:29:51 UTC
Created attachment 1127333 [details]
Proposed upstream patch 2

Comment 5 Adam Mariš 2016-02-15 16:30:17 UTC
Created attachment 1127335 [details]
Proposed upstream patch 3

Comment 6 Adam Mariš 2016-02-15 16:30:47 UTC
Created attachment 1127336 [details]
Proposed upstream patch 4

Comment 8 Huzaifa S. Sidhpurwala 2017-03-24 06:38:31 UTC
This patch was applied to upstream master branch to fix this issue:

https://github.com/openssl/openssl/commit/33cc5dde478ba5ad79f8fd4acd8737f0e60e236e


Note You need to log in before you can comment on or make changes to this bug.