2022-01-17
ALT-BU-2022-3677-1
Branch sisyphus_riscv64 update bulletin.
Package LibreSSL updated to version 3.4.2-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Published: 2021-09-24
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-41581
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.
Severity: MEDIUM (5.5)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
References:
Published: 2023-04-15
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-46880
x509/x509_verify.c in LibreSSL before 3.4.2, and OpenBSD before 7.0 errata 006, allows authentication bypass because an error for an unverified certificate chain is sometimes discarded.
Severity: CRITICAL (9.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.2-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.2-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.0/common/006_x509.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.0/common/006_x509.patch.sig
- https://github.com/openbsd/src/commit/3f851282810fa0ab4b90b3b1ecec2e8717ef16f8
- https://github.com/openbsd/src/commit/3f851282810fa0ab4b90b3b1ecec2e8717ef16f8
- https://security.netapp.com/advisory/ntap-20230517-0006/
- https://security.netapp.com/advisory/ntap-20230517-0006/