Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 24 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Leancrypto
Leancrypto leancrypto |
|
| CPEs | cpe:2.3:a:leancrypto:leancrypto:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Leancrypto
Leancrypto leancrypto |
Fri, 03 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smuellerdd
Smuellerdd leancrypto |
|
| Vendors & Products |
Smuellerdd
Smuellerdd leancrypto |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The leancrypto library is a cryptographic library that exclusively contains only PQC-resistant cryptographic algorithms. Prior to version 1.7.1, lc_x509_extract_name_segment() casts size_t vlen to uint8_t when storing the Common Name (CN) length. An attacker who crafts a certificate with CN = victim's CN + 256 bytes padding gets cn_size = (uint8_t)(256 + N) = N, where N is the victim's CN length. The first N bytes of the attacker's CN are the victim's identity. After parsing, the attacker's certificate has an identical CN to the victim's — enabling identity impersonation in PKCS#7 verification, certificate chain matching, and code signing. This issue has been patched in version 1.7.1. | |
| Title | leancrypto: Integer truncation in X.509 name parser enables certificate identity impersonation | |
| Weaknesses | CWE-681 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T17:25:10.195Z
Reserved: 2026-03-30T17:15:52.500Z
Link: CVE-2026-34610
Updated: 2026-04-03T17:25:03.484Z
Status : Analyzed
Published: 2026-04-02T18:16:32.567
Modified: 2026-04-24T13:01:10.780
Link: CVE-2026-34610
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:17:09Z