Skip to content

crypto/x509: ParseRevocationList accepts two AKI extensions #73051

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
onepeople158 opened this issue Mar 26, 2025 · 1 comment
Open

crypto/x509: ParseRevocationList accepts two AKI extensions #73051

onepeople158 opened this issue Mar 26, 2025 · 1 comment
Labels
NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one.

Comments

@onepeople158
Copy link

Go version

go version go1.24.1 linux/amd64

Output of go env in your module/workspace:

Extension OID: 2.5.29.35
Key Identifier: ef69e0f7d51de699ecdc6dd0f7e2b95c64718335
No Authority Cert Issuer
No Authority Cert Serial Number
Extension OID: 2.5.29.20
Extension OID: 2.5.29.35
Key Identifier: ef69e0f7d51de699ecdc6dd0f7e2b95c64718335
No Authority Cert Issuer
No Authority Cert Serial Number

What did you do?

Go successfully parsed the AKI extension information from a CRL file that contains two AKI extensions. However, this test case does not comply with the RFC 5280 specification, which states that a specific extension can only have one instance.

What did you see happen?

Go successfully parsed the AKI extension information from a CRL file that contains two AKI extensions.

What did you expect to see?

crl_two_aki.zip

@dmitshur
Copy link
Member

CC @golang/security.

@dmitshur dmitshur added the NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one. label Mar 26, 2025
@seankhliao seankhliao changed the title crypto/x509: accepts CRL with two AKI extension crypto/x509: ParseRevocationList accepts two AKI extensions Apr 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one.
Projects
None yet
Development

No branches or pull requests

2 participants