Audit required: (*crypto/x509.Certificate).Verify does not check for certificate revocation GO-S1031
Security
Major
a year agoa year old
Verify does not check for certificate revocation
168		}
169	}
170
171	_, err = newCerts[0].Verify(x509.VerifyOptions{Roots: roots, Intermediates: intermediates})172	if err != nil {
173		err = errors.Wrap(err, "new CA cert cannot be verified using old CA chain")
174	}
Verify does not check for certificate revocation
151				}
152			}
153		}
154		if chains, err := certs[0].Verify(x509.VerifyOptions{Roots: roots, Intermediates: intermediates}); err == nil {155			// It's possible but unlikely that there could be multiple valid chains back to a root
156			// certificate. Just use the first.
157			chain := chains[0]