cyber-dojo
flows
nginx-archived-at-1707630884
artifacts
8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d
By signing up, you agree to the
Terms of Service.
For more information about Kosli’s privacy practices, see the Kosli’s
Privacy Policy.
We’ll occasionally send you account-related emails.
We’ll occasionally send you account-related emails.
nginx-archived-at-1707630884
Reverse proxy
cyberdojo/nginx:50b3a11
Non-compliant
Download Evidence Package
JSON
{ "created_at": 1696595866.860938, "fingerprint": "8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d", "filename": "cyberdojo/nginx:50b3a11", "git_commit": "50b3a1116ef6135f6d264f45b4c882ef4e076b01", "build_url": "https://github.com/cyber-dojo/nginx/actions/runs/6431696807", "commit_url": "https://github.com/cyber-dojo/nginx/commit/50b3a1116ef6135f6d264f45b4c882ef4e076b01", "evidence": { "snyk-scan": { "evidence_type": "snyk", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/snyk_scans/actions/runs/6469870007", "evidence_archive_fingerprint": "799c70aa70935986fa3fb197dc43321a60e5c93a55acd5685ba28b0958235d10", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/share/java", "docker": {}, "filesystemPolicy": true, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "maven", "path": "cyberdojo/nginx@sha256:8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d/nginx@sha256:8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d:/usr/share/java", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "cyberdojo/nginx@sha256:8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d:/usr/share/java", "severityThreshold": "medium", "summary": "No medium or high or critical severity vulnerabilities", "targetFile": "/usr/share/java", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 149, "docker": { "baseImage": "nginx:1.25.2-bookworm", "baseImageRemediation": { "advice": [ { "bold": true, "message": "According to our scan, you are currently using the most secure version of the selected base image" } ], "code": "NO_REMEDIATION_AVAILABLE" } }, "filesystemPolicy": true, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "jonjagger", "packageManager": "deb", "path": "cyberdojo/nginx@sha256:8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d/nginx", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/nginx", "severityThreshold": "medium", "summary": "30 medium or high or critical severity vulnerable dependency paths", "uniqueCount": 5, "vulnerabilities": [ { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-09-14T00:34:19.752526Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-09-21T01:10:49.366299Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-09-28T11:04:54.155183Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `curl` package and not the `curl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nWhen curl retrieves an HTTP response, it stores the incoming headers so that\nthey can be accessed later via the libcurl headers API.\n\nHowever, curl did not have a limit in how many or how large headers it would\naccept in a response, allowing a malicious server to stream an endless series\nof headers and eventually cause curl to run out of heap memory.\n## Remediation\nUpgrade `Debian:12` `curl` to version 7.88.1-10+deb12u3 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-38039)\n- [support@hackerone.com](https://hackerone.com/reports/2072338)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/)\n", "disclosureTime": "2023-09-15T04:15:10.127000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.18050", "probability": "0.00052" }, "exploit": "Not Defined", "fixedIn": [ "7.88.1-10+deb12u3" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1" ], "id": "SNYK-DEBIAN12-CURL-5901300", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-38039" ], "CWE": [ "CWE-770" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T00:40:09.693406Z", "name": "curl/libcurl4", "nearestFixedInVersion": "7.88.1-10+deb12u3", "nvdSeverity": "high", "packageManager": "debian:12", "packageName": "curl", "patches": [], "publicationTime": "2023-09-14T00:34:08.048869Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-38039", "url": "https://security-tracker.debian.org/tracker/CVE-2023-38039" }, { "title": "https://hackerone.com/reports/2072338", "url": "https://hackerone.com/reports/2072338" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<7.88.1-10+deb12u3" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Allocation of Resources Without Limits or Throttling", "upgradePath": [], "version": "7.88.1-10+deb12u1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-09-14T00:34:19.752526Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-09-21T01:10:49.366299Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-09-28T11:04:54.155183Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `curl` package and not the `curl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nWhen curl retrieves an HTTP response, it stores the incoming headers so that\nthey can be accessed later via the libcurl headers API.\n\nHowever, curl did not have a limit in how many or how large headers it would\naccept in a response, allowing a malicious server to stream an endless series\nof headers and eventually cause curl to run out of heap memory.\n## Remediation\nUpgrade `Debian:12` `curl` to version 7.88.1-10+deb12u3 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-38039)\n- [support@hackerone.com](https://hackerone.com/reports/2072338)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/)\n", "disclosureTime": "2023-09-15T04:15:10.127000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.18050", "probability": "0.00052" }, "exploit": "Not Defined", "fixedIn": [ "7.88.1-10+deb12u3" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1" ], "id": "SNYK-DEBIAN12-CURL-5901300", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-38039" ], "CWE": [ "CWE-770" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T00:40:09.693406Z", "name": "curl", "nearestFixedInVersion": "7.88.1-10+deb12u3", "nvdSeverity": "high", "packageManager": "debian:12", "packageName": "curl", "patches": [], "publicationTime": "2023-09-14T00:34:08.048869Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-38039", "url": "https://security-tracker.debian.org/tracker/CVE-2023-38039" }, { "title": "https://hackerone.com/reports/2072338", "url": "https://hackerone.com/reports/2072338" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<7.88.1-10+deb12u3" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Allocation of Resources Without Limits or Throttling", "upgradePath": [ false, "curl@7.88.1-10+deb12u3" ], "version": "7.88.1-10+deb12u1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5support0@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libkrb5support0", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libk5crypto3@1.20.1-2", "krb5/libkrb5support0@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libkrb5support0", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "krb5/libkrb5support0@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libkrb5support0", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libk5crypto3@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libk5crypto3", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "krb5/libk5crypto3@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libk5crypto3", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libkrb5-3", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libgssapi-krb5-2", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx@1.25.2-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx@1.25.2-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx@1.25.2-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx-module-njs@1.25.2+0.8.0-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx-module-njs@1.25.2+0.8.0-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx-module-njs@1.25.2+0.8.0-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "libssh2/libssh2-1@1.10.0-3+b1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "libssh2/libssh2-1@1.10.0-3+b1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "libssh2/libssh2-1@1.10.0-3+b1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" } ] }, "created_at": 1696944022.5338454, "has_audit_package": true } }, "git_commit_info": { "sha1": "50b3a1116ef6135f6d264f45b4c882ef4e076b01", "message": "Add apt-get upgrade to Dockerfile to fix security issues in nginx base image", "author": "Faye <faye@kosli.com>", "timestamp": 1696595779, "branch": "main" }, "repo_url": "https://github.com/cyber-dojo/nginx", "template": [ "artifact", "snyk-scan" ], "last_modified_at": 1696944022.5338454, "deployments": [ 70, 69 ], "state": "NON-COMPLIANT", "html_url": "https://app.kosli.com/cyber-dojo/flows/nginx-archived-at-1707630884/artifacts/8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d", "api_url": "https://app.kosli.com/api/v2/artifacts/cyber-dojo/nginx-archived-at-1707630884/fingerprint/8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d" }
Artifact Information |
|
Name | cyberdojo/nginx:50b3a11 |
Fingerprint | 8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d |
Git commit |
50b3a11
Faye <faye@kosli.com> (main)
1696595779.0 • 7 months ago
Add apt-get upgrade to Dockerfile to fix security issues in nginx base image
|
CI Build | https://github.com/cyber-dojo/nginx/actions/runs/6431696807 |
Running | - |
Exited | aws-beta#1847 aws-prod#1119 |
Last modified | 1696944022.5338454 • 7 months ago |
Approvals
None |
Evidence
Evidence for 'snyk-scan'
{ "evidence_type": "snyk", "name": "snyk-scan", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/snyk_scans/actions/runs/6469870007", "evidence_archive_fingerprint": "799c70aa70935986fa3fb197dc43321a60e5c93a55acd5685ba28b0958235d10", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/share/java", "docker": {}, "filesystemPolicy": true, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "maven", "path": "cyberdojo/nginx@sha256:8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d/nginx@sha256:8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d:/usr/share/java", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "cyberdojo/nginx@sha256:8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d:/usr/share/java", "severityThreshold": "medium", "summary": "No medium or high or critical severity vulnerabilities", "targetFile": "/usr/share/java", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 149, "docker": { "baseImage": "nginx:1.25.2-bookworm", "baseImageRemediation": { "advice": [ { "bold": true, "message": "According to our scan, you are currently using the most secure version of the selected base image" } ], "code": "NO_REMEDIATION_AVAILABLE" } }, "filesystemPolicy": true, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "jonjagger", "packageManager": "deb", "path": "cyberdojo/nginx@sha256:8b9340c2b0763fc4c17ec5515bae3a2d97d8687e184342bb85f1d915e2958d7d/nginx", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/nginx", "severityThreshold": "medium", "summary": "30 medium or high or critical severity vulnerable dependency paths", "uniqueCount": 5, "vulnerabilities": [ { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-09-14T00:34:19.752526Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-09-21T01:10:49.366299Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-09-28T11:04:54.155183Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `curl` package and not the `curl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nWhen curl retrieves an HTTP response, it stores the incoming headers so that\nthey can be accessed later via the libcurl headers API.\n\nHowever, curl did not have a limit in how many or how large headers it would\naccept in a response, allowing a malicious server to stream an endless series\nof headers and eventually cause curl to run out of heap memory.\n## Remediation\nUpgrade `Debian:12` `curl` to version 7.88.1-10+deb12u3 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-38039)\n- [support@hackerone.com](https://hackerone.com/reports/2072338)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/)\n", "disclosureTime": "2023-09-15T04:15:10.127000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.18050", "probability": "0.00052" }, "exploit": "Not Defined", "fixedIn": [ "7.88.1-10+deb12u3" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1" ], "id": "SNYK-DEBIAN12-CURL-5901300", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-38039" ], "CWE": [ "CWE-770" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T00:40:09.693406Z", "name": "curl/libcurl4", "nearestFixedInVersion": "7.88.1-10+deb12u3", "nvdSeverity": "high", "packageManager": "debian:12", "packageName": "curl", "patches": [], "publicationTime": "2023-09-14T00:34:08.048869Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-38039", "url": "https://security-tracker.debian.org/tracker/CVE-2023-38039" }, { "title": "https://hackerone.com/reports/2072338", "url": "https://hackerone.com/reports/2072338" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<7.88.1-10+deb12u3" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Allocation of Resources Without Limits or Throttling", "upgradePath": [], "version": "7.88.1-10+deb12u1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-09-14T00:34:19.752526Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-09-21T01:10:49.366299Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-09-28T11:04:54.155183Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `curl` package and not the `curl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nWhen curl retrieves an HTTP response, it stores the incoming headers so that\nthey can be accessed later via the libcurl headers API.\n\nHowever, curl did not have a limit in how many or how large headers it would\naccept in a response, allowing a malicious server to stream an endless series\nof headers and eventually cause curl to run out of heap memory.\n## Remediation\nUpgrade `Debian:12` `curl` to version 7.88.1-10+deb12u3 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-38039)\n- [support@hackerone.com](https://hackerone.com/reports/2072338)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/)\n- [support@hackerone.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/)\n", "disclosureTime": "2023-09-15T04:15:10.127000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.18050", "probability": "0.00052" }, "exploit": "Not Defined", "fixedIn": [ "7.88.1-10+deb12u3" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1" ], "id": "SNYK-DEBIAN12-CURL-5901300", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-38039" ], "CWE": [ "CWE-770" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T00:40:09.693406Z", "name": "curl", "nearestFixedInVersion": "7.88.1-10+deb12u3", "nvdSeverity": "high", "packageManager": "debian:12", "packageName": "curl", "patches": [], "publicationTime": "2023-09-14T00:34:08.048869Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-38039", "url": "https://security-tracker.debian.org/tracker/CVE-2023-38039" }, { "title": "https://hackerone.com/reports/2072338", "url": "https://hackerone.com/reports/2072338" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/" }, { "title": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<7.88.1-10+deb12u3" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Allocation of Resources Without Limits or Throttling", "upgradePath": [ false, "curl@7.88.1-10+deb12u3" ], "version": "7.88.1-10+deb12u1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5support0@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libkrb5support0", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libk5crypto3@1.20.1-2", "krb5/libkrb5support0@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libkrb5support0", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "krb5/libkrb5support0@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libkrb5support0", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libk5crypto3@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libk5crypto3", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "krb5/libk5crypto3@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libk5crypto3", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libkrb5-3", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2023-08-08T01:07:03.929822Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-16T01:10:59.882525Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-08-17T11:02:12.574963Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2023-08-23T13:44:06.372458Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `krb5` package and not the `krb5` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nlib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.\n## Remediation\nUpgrade `Debian:12` `krb5` to version 1.20.1-2+deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-36054)\n- [cve@mitre.org](https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final)\n- [cve@mitre.org](https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final)\n- [cve@mitre.org](https://web.mit.edu/kerberos/www/advisories/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230908-0004/)\n", "disclosureTime": "2023-08-07T19:15:09.840000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52401", "probability": "0.00161" }, "exploit": "Not Defined", "fixedIn": [ "1.20.1-2+deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2" ], "id": "SNYK-DEBIAN12-KRB5-5825659", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-36054" ], "CWE": [ "CWE-824" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T01:34:17.723535Z", "name": "krb5/libgssapi-krb5-2", "nearestFixedInVersion": "1.20.1-2+deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "krb5", "patches": [], "publicationTime": "2023-08-08T01:06:33.373942Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-36054", "url": "https://security-tracker.debian.org/tracker/CVE-2023-36054" }, { "title": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd", "url": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final" }, { "title": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final", "url": "https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final" }, { "title": "https://web.mit.edu/kerberos/www/advisories/", "url": "https://web.mit.edu/kerberos/www/advisories/" }, { "title": "https://security.netapp.com/advisory/ntap-20230908-0004/", "url": "https://security.netapp.com/advisory/ntap-20230908-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<1.20.1-2+deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Access of Uninitialized Pointer", "upgradePath": [], "version": "1.20.1-2" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx@1.25.2-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx@1.25.2-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx@1.25.2-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx-module-njs@1.25.2+0.8.0-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx-module-njs@1.25.2+0.8.0-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "nginx-module-njs@1.25.2+0.8.0-1~bookworm", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "libssh2/libssh2-1@1.10.0-3+b1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "libssh2/libssh2-1@1.10.0-3+b1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "libssh2/libssh2-1@1.10.0-3+b1", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "curl@7.88.1-10+deb12u1", "curl/libcurl4@7.88.1-10+deb12u1", "krb5/libgssapi-krb5-2@1.20.1-2", "krb5/libkrb5-3@1.20.1-2", "openssl/libssl3@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2023-07-15T01:59:11.923863Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-07-27T13:11:18.639951Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "modificationTime": "2023-07-29T11:06:24.174701Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:32:55.795420Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-2975)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230714.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/15/1)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230725-0004/)\n", "disclosureTime": "2023-07-14T12:15:09.023000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64605", "probability": "0.00278" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5776700", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-2975" ], "CWE": [ "CWE-287" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:39:26.762755Z", "name": "openssl", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-15T01:56:47.741607Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-2975", "url": "https://security-tracker.debian.org/tracker/CVE-2023-2975" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=00e2f5eea29994d19293ec4e8c8775ba73678598" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc" }, { "title": "https://www.openssl.org/news/secadv/20230714.txt", "url": "https://www.openssl.org/news/secadv/20230714.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/15/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "https://security.netapp.com/advisory/ntap-20230725-0004/", "url": "https://security.netapp.com/advisory/ntap-20230725-0004/" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Authentication", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-07-20T01:50:10.257559Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-25T13:32:17.801774Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-26T11:03:32.344082Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-07-29T01:10:57.595980Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3446)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230719.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/4)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/5)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/19/6)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230803-0011/)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n", "disclosureTime": "2023-07-19T12:15:10.003000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.63495", "probability": "0.00262" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5788322", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3446" ], "CWE": [ "CWE-1333" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:40:06.238491Z", "name": "openssl", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-07-20T01:50:10.235107Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3446", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3446" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1fa20cf2f506113c761777127a38bce5068740eb" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8780a896543a654e757db1b9396383f9d8095528" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "title": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "https://security.netapp.com/advisory/ntap-20230803-0011/", "url": "https://security.netapp.com/advisory/ntap-20230803-0011/" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Inefficient Regular Expression Complexity", "upgradePath": [], "version": "3.0.9-1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "cpes": [], "creationTime": "2023-08-01T13:45:07.815112Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2023-08-01T13:31:51.629782Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T01:12:10.245558Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2023-08-09T11:03:42.422326Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Debian`._\n_See `How to fix?` for `Debian:12` relevant fixed versions and status._\n\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the "-check" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.\n## Remediation\nUpgrade `Debian:12` `openssl` to version 3.0.10-1~deb12u1 or higher.\n## References\n- [ADVISORY](https://security-tracker.debian.org/tracker/CVE-2023-3817)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20230731.txt)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/07/31/1)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2023/Jul/43)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20230818-0014/)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/9)\n- [openssl-security@openssl.org](http://www.openwall.com/lists/oss-security/2023/09/22/11)\n", "disclosureTime": "2023-07-31T16:15:10.497000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.52063", "probability": "0.00159" }, "exploit": "Not Defined", "fixedIn": [ "3.0.10-1~deb12u1" ], "from": [ "docker-image|cyberdojo/nginx@*", "ca-certificates@20230311", "openssl@3.0.9-1" ], "id": "SNYK-DEBIAN12-OPENSSL-5812633", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-3817" ], "CWE": [ "CWE-834" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-10-08T02:38:02.857373Z", "name": "openssl", "nearestFixedInVersion": "3.0.10-1~deb12u1", "nvdSeverity": "medium", "packageManager": "debian:12", "packageName": "openssl", "patches": [], "publicationTime": "2023-08-01T13:44:38.433704Z", "references": [ { "title": "https://security-tracker.debian.org/tracker/CVE-2023-3817", "url": "https://security-tracker.debian.org/tracker/CVE-2023-3817" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "title": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "title": "https://www.openssl.org/news/secadv/20230731.txt", "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "title": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "title": "http://seclists.org/fulldisclosure/2023/Jul/43", "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "title": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html" }, { "title": "https://security.netapp.com/advisory/ntap-20230818-0014/", "url": "https://security.netapp.com/advisory/ntap-20230818-0014/" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9" }, { "title": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11" } ], "relativeImportance": "not yet assigned", "semver": { "vulnerable": [ "<3.0.10-1~deb12u1" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Excessive Iteration", "upgradePath": [], "version": "3.0.9-1" } ] }, "created_at": 1696944022.5338454, "has_audit_package": true }