You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Due to how policy validation was implemented, passing VerifyOptions.KeyUsages containing ExtKeyUsageAny unintentionally disables policy validation. These two properties are unrelated, and disabling key usage validation shouldn't disable policy validation.
This is a security issue, but due to the rarity of policy validation, and because it requires the user to explicitly set ExtKeyUsageAny, which is also rare, we are treating this as a PUBLIC track security issue, per the Go Security policy.
Thanks to Krzysztof Skrzętnicki (@Tener) of Teleport for reporting this issue.
This is CVE-2025-22874.
The text was updated successfully, but these errors were encountered:
Due to how policy validation was implemented, passing VerifyOptions.KeyUsages containing ExtKeyUsageAny unintentionally disables policy validation. These two properties are unrelated, and disabling key usage validation shouldn't disable policy validation.
This is a security issue, but due to the rarity of policy validation, and because it requires the user to explicitly set ExtKeyUsageAny, which is also rare, we are treating this as a PUBLIC track security issue, per the Go Security policy.
Thanks to Krzysztof Skrzętnicki (@Tener) of Teleport for reporting this issue.
This is CVE-2025-22874.
The text was updated successfully, but these errors were encountered: