Headline
CVE-2022-1343: git.openssl.org Git - openssl.git/commitdiff
The function OCSP_basic_verify verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of OCSP_basic_verify will not use the OCSP_NOCHECKS flag. In this case the OCSP_basic_verify function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL “ocsp” application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
The function `OCSP_basic_verify` validates the signer certificate on an OCSP
response. The internal function, ocsp_verify_signer, is responsible for this
and is expected to return a 0 value in the event of a failure to verify.
Unfortunately, due to a bug, it actually returns with a postive success
response in this case. In the normal course of events OCSP_basic_verify
will then continue and will fail anyway in the ocsp_check_issuer function
because the supplied “chain” value will be empty in the case that
ocsp_verify_signer failed to verify the chain. This will cause
OCSP_basic_verify to return with a negative result (fatal error). Normally
in the event of a failure to verify it should return with 0.
However, in the case of the OCSP_NOCHECKS flag being used, OCSP_basic_verify
will return with a positvie result. This could lead to callers trusting an
OCSP Basic response when it should not be.
CVE-2022-1343
Fixes #18053
Reviewed-by: Paul Dale pauli@openssl.org
Reviewed-by: Tomas Mraz tomas@openssl.org
Reviewed-by: Matt Caswell matt@openssl.org
ret = X509\_verify\_cert(ctx);
if (ret <= 0) {
- ret = X509_STORE_CTX_get_error(ctx);
int err = X509\_STORE\_CTX\_get\_error(ctx);ERR\_raise\_data(ERR\_LIB\_OCSP, OCSP\_R\_CERTIFICATE\_VERIFY\_ERROR,
- "Verify error: %s", X509_verify_cert_error_string(ret));
"Verify error: %s", X509\_verify\_cert\_error\_string(err)); goto end;}
if (chain != NULL)