]> git.ipfire.org Git - thirdparty/openssl.git/commit
With SSL_VERIFY_PEER client RPK should abort on X509 error
authorViktor Dukhovni <viktor@openssl.org>
Thu, 19 Dec 2024 17:25:15 +0000 (04:25 +1100)
committerNeil Horman <nhorman@openssl.org>
Tue, 11 Feb 2025 13:48:44 +0000 (08:48 -0500)
commit798779d43494549b611233f92652f0da5328fbe7
tree7b7fc849bd791b6b2c38b5106a588ab1682798b6
parent0db27ec7f8abd258d2e8849ac555ca26ba0cd8d6
With SSL_VERIFY_PEER client RPK should abort on X509 error

While RPK performs X.509 checks correctly, at the SSL layer the
SSL_VERIFY_PEER flag was not honoured and connections were allowed to
complete even when the server was not verified.  The client can of
course determine this by calling SSL_get_verify_result(), but some
may not know to do this.

Added tests to make sure this does not regress.

Fixes CVE-2024-12797

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(cherry picked from commit 87ebd203feffcf92ad5889df92f90bb0ee10a699)
ssl/statem/statem_clnt.c
test/rpktest.c