Skip to content

crypto/x509: ExtKeyUsageAny bypasses policy validation #73612

Closed
@rolandshoemaker

Description

@rolandshoemaker

Due to how policy validation was implemented, passing VerifyOptions.KeyUsages containing ExtKeyUsageAny unintentionally disables policy validation. These two properties are unrelated, and disabling key usage validation shouldn't disable policy validation.

This is a security issue, but due to the rarity of policy validation, and because it requires the user to explicitly set ExtKeyUsageAny, which is also rare, we are treating this as a PUBLIC track security issue, per the Go Security policy.

Thanks to Krzysztof Skrzętnicki (@Tener) of Teleport for reporting this issue.

This is CVE-2025-22874.

Metadata

Metadata

Labels

BugReportIssues describing a possible bug in the Go implementation.Security

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions