
CVE-2023-35784
https://notcve.org/view.php?id=CVE-2023-35784
16 Jun 2023 — A double free or use after free could occur after SSL_clear in OpenBSD 7.2 before errata 026 and 7.3 before errata 004, and in LibreSSL before 3.6.3 and 3.7.x before 3.7.3. NOTE: OpenSSL is not affected. • https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.3-relnotes.txt • CWE-415: Double Free CWE-416: Use After Free •

CVE-2021-46880
https://notcve.org/view.php?id=CVE-2021-46880
14 Apr 2023 — x509/x509_verify.c in LibreSSL before 3.4.2, and OpenBSD before 7.0 errata 006, allows authentication bypass because an error for an unverified certificate chain is sometimes discarded. • https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.2-relnotes.txt • CWE-295: Improper Certificate Validation •

CVE-2022-48437
https://notcve.org/view.php?id=CVE-2022-48437
12 Apr 2023 — An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate. • https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.1-relnotes.txt • CWE-295: Improper Certificate Validation •

CVE-2021-41581
https://notcve.org/view.php?id=CVE-2021-41581
24 Sep 2021 — x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination. La función x509_constraints_parse_mailbox en el archivo lib/libcrypto/x509/x509_constraints.c en LibreSSL versiones hasta 3.4.0, presenta una lectura excesiva del búfer en la región stack de la memoria. Cuando la entrada excede DOMAIN_PART_MAX_LEN, el búfer carece de terminación "\0". • https://github.com/libressl-portable/openbsd/issues/126 • CWE-125: Out-of-bounds Read •

CVE-2018-12434
https://notcve.org/view.php?id=CVE-2018-12434
15 Jun 2018 — LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. LibreSSL en versiones anteriores a la 2.6.5 y versiones 2.7.x anteriores a la 2.7.4 permite un ataque de canal lateral por caché de memoria en las firmas DSA y ECDSA. Esto también se conoce como Return Of the Hi... • https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.6.5-relnotes.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2017-8301
https://notcve.org/view.php?id=CVE-2017-8301
27 Apr 2017 — LibreSSL 2.5.1 to 2.5.3 lacks TLS certificate verification if SSL_get_verify_result is relied upon for a later check of a verification result, in a use case where a user-provided verification callback returns 1, as demonstrated by acceptance of invalid certificates by nginx. LibreSSL en las versiones 2.5.1 hasta la 2.5.3 carece de verificación de certificados TLS si se invoca SSL_get_verify_result para una comprobación posterior de un resultado de verificación, en un caso de uso en el que una devolución de ... • http://seclists.org/oss-sec/2017/q2/145 • CWE-295: Improper Certificate Validation •