
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. The vulnerability relates to how x509_verify_ctx_add_chain handles custom verification callbacks, which could cause the X.509 verifier to fail to store errors resulting from leaf certificate verification (LibreSSL Release, OpenBSD Patch).
The vulnerability occurs when a verification callback is installed that tells the verifier to continue when a certificate is invalid (e.g., expired). In such cases, any error resulting from the leaf certificate verification is not stored and made available post verification, resulting in an incorrect error being returned. The issue was discovered in the x509_verify.c file, specifically in the x509_verify_ctx_add_chain function (OpenBSD Commit).
When exploited, this vulnerability could lead to incorrect error reporting during certificate verification processes. This could potentially result in invalid certificates being accepted or valid certificates being rejected, depending on how the verification callback is implemented (OpenBSD Patch).
The issue has been fixed in LibreSSL 3.6.1 and OpenBSD 7.2 errata 001. The fix involves performing leaf certificate verification prior to adding the chain and properly storing any resulting errors. Users should upgrade to LibreSSL 3.6.1 or apply the OpenBSD 7.2 errata 001 patch (LibreSSL Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."