cyber-dojo
flows
shas-archived-at-1705491385
artifacts
5131e85ad9520497bb488841b571c00853366ea0352b5c8606e064c31db57a39
By signing up, you agree to the
Terms of Service.
For more information about Kosli’s privacy practices, see the Kosli’s
Privacy Policy.
We’ll occasionally send you account-related emails.
We’ll occasionally send you account-related emails.
shas-archived-at-1705491385
UX for git+image shas
cyberdojo/shas:26b59d0
Non-compliant
Download Evidence Package
JSON
{ "created_at": 1694004000.5062072, "fingerprint": "5131e85ad9520497bb488841b571c00853366ea0352b5c8606e064c31db57a39", "filename": "cyberdojo/shas:26b59d0", "git_commit": "26b59d09deff3ec2d7baf5a9260bc165929e6ebf", "build_url": "https://github.com/cyber-dojo/shas/actions/runs/5891977237", "commit_url": "https://github.com/cyber-dojo/shas/commit/26b59d09deff3ec2d7baf5a9260bc165929e6ebf", "evidence": { "branch-coverage": { "evidence_type": "generic", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/shas/actions/runs/5891977237", "description": "server & client branch-coverage reports", "user_data": { "client": { "command_name": "Minitest", "groups": { "app": { "branches": { "covered": 1, "missed": 1, "total": 2 }, "lines": { "covered": 52, "missed": 0, "total": 52 } }, "test": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 0, "missed": 0, "total": 0 } } }, "timestamp": 1694003989 }, "server": { "command_name": "Minitest", "groups": { "app": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 69, "missed": 0, "total": 69 } }, "test": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 0, "missed": 0, "total": 0 } } }, "timestamp": 1694003977 } }, "created_at": 1694004002.466227, "has_audit_package": false }, "snyk-scan": { "evidence_type": "snyk", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/shas/actions/runs/5891977237", "evidence_archive_fingerprint": "2cc8f4952a65435c1a08a29752d6b3b22fe6257ff61a1622e4e5516f46101f69", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/local/bundle/gems/concurrent-ruby-1.1.7/lib/concurrent-ruby/concurrent", "docker": {}, "filesystemPolicy": false, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "fayesgw", "packageManager": "maven", "path": "cyberdojo/shas:26b59d0/shas:26b59d0:/usr/local/bundle/gems/concurrent-ruby-1.1.7/lib/concurrent-ruby/concurrent", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "cyberdojo/shas:26b59d0:/usr/local/bundle/gems/concurrent-ruby-1.1.7/lib/concurrent-ruby/concurrent", "summary": "No known vulnerabilities", "targetFile": "/usr/local/bundle/gems/concurrent-ruby-1.1.7/lib/concurrent-ruby/concurrent", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 45, "docker": { "baseImage": "ruby:2-alpine", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Your base image is out of date" }, { "message": "1) Pull the latest version of your base image by running 'docker pull ruby:2-alpine'" }, { "message": "2) Rebuild your local image" }, { "bold": true, "color": "yellow", "message": "Alpine 3.12.1 is no longer supported by the Alpine maintainers. Vulnerability detection may be affected by a lack of security updates." } ], "baseImageOutdated": true, "code": "OUTDATED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": false, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "fayesgw", "packageManager": "apk", "path": "cyberdojo/shas:26b59d0/shas", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/shas", "summary": "229 vulnerable dependency paths", "uniqueCount": 53, "vulnerabilities": [ { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-04-15T03:45:07.931682Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T16:38:38.769177Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `apk-tools` package and not the `apk-tools` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn Alpine Linux apk-tools before 2.12.5, the tarball parser allows a buffer overflow and crash.\n## Remediation\nUpgrade `Alpine:3.12` `apk-tools` to version 2.10.6-r0 or higher.\n## References\n- [MISC](https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741)\n- [MISC](https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606)\n", "disclosureTime": "2021-04-21T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.37847", "probability": "0.00091" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1" ], "id": "SNYK-ALPINE312-APKTOOLS-1246338", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-30139" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T14:22:12.399050Z", "name": "apk-tools/apk-tools", "nearestFixedInVersion": "2.10.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "apk-tools", "patches": [], "publicationTime": "2021-04-15T03:45:07.947271Z", "references": [ { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741" }, { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<2.10.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "apk-tools/apk-tools@2.10.6-r0" ], "version": "2.10.5-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-07-27T14:06:41.093570Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-01-03T16:44:39.243547Z", "severity": "critical" } ], "cvssScore": 9.1, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `apk-tools` package and not the `apk-tools` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nlibfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the '\\0' terminator one byte too late.\n## Remediation\nUpgrade `Alpine:3.12` `apk-tools` to version 2.10.7-r0 or higher.\n## References\n- [MISC](https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch)\n- [MISC](https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749)\n- [MLIST](https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E)\n", "disclosureTime": "2021-08-03T14:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.48882", "probability": "0.00142" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1" ], "id": "SNYK-ALPINE312-APKTOOLS-1533753", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-36159" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T14:21:26.261460Z", "name": "apk-tools/apk-tools", "nearestFixedInVersion": "2.10.7-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "apk-tools", "patches": [], "publicationTime": "2021-07-27T14:06:38.323743Z", "references": [ { "title": "MISC", "url": "https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch" }, { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<2.10.7-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "apk-tools/apk-tools@2.10.7-r0" ], "version": "2.10.5-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [ false, "busybox/busybox@1.31.1-r20" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [ false, "busybox/busybox@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [ false, "busybox/busybox@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r20" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "cpes": [], "creationTime": "2021-08-11T15:50:37.172366Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:49:40.126160Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:19:02.911789Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-10-19T01:10:42.171066Z", "severity": "medium" } ], "cvssScore": 5.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `c-ares` package and not the `c-ares` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.\n## Remediation\nUpgrade `Alpine:3.12` `c-ares` to version 1.17.2-r0 or higher.\n## References\n- [secalert@redhat.com](https://c-ares.haxx.se/adv_20210810.html)\n- [secalert@redhat.com](https://bugzilla.redhat.com/show_bug.cgi?id=1988342)\n- [secalert@redhat.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [secalert@redhat.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-11-23T19:15:07.877000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.51121", "probability": "0.00157" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "c-ares/c-ares@1.16.1-r0" ], "id": "SNYK-ALPINE312-CARES-1540337", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3672" ], "CWE": [ "CWE-79" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:34:32.468732Z", "name": "c-ares/c-ares", "nearestFixedInVersion": "1.17.2-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "c-ares", "patches": [], "publicationTime": "2021-08-11T15:48:12.535347Z", "references": [ { "title": "secalert@redhat.com", "url": "https://c-ares.haxx.se/adv_20210810.html" }, { "title": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "title": "secalert@redhat.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.17.2-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Cross-site Scripting (XSS)", "upgradePath": [ false, "c-ares/c-ares@1.17.2-r0" ], "version": "1.16.1-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "cpes": [], "creationTime": "2021-08-11T15:50:37.172366Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:49:40.126160Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:19:02.911789Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-10-19T01:10:42.171066Z", "severity": "medium" } ], "cvssScore": 5.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `c-ares` package and not the `c-ares` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.\n## Remediation\nUpgrade `Alpine:3.12` `c-ares` to version 1.17.2-r0 or higher.\n## References\n- [secalert@redhat.com](https://c-ares.haxx.se/adv_20210810.html)\n- [secalert@redhat.com](https://bugzilla.redhat.com/show_bug.cgi?id=1988342)\n- [secalert@redhat.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [secalert@redhat.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-11-23T19:15:07.877000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.51121", "probability": "0.00157" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "c-ares/c-ares@1.16.1-r0" ], "id": "SNYK-ALPINE312-CARES-1540337", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3672" ], "CWE": [ "CWE-79" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:34:32.468732Z", "name": "c-ares/c-ares", "nearestFixedInVersion": "1.17.2-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "c-ares", "patches": [], "publicationTime": "2021-08-11T15:48:12.535347Z", "references": [ { "title": "secalert@redhat.com", "url": "https://c-ares.haxx.se/adv_20210810.html" }, { "title": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "title": "secalert@redhat.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.17.2-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Cross-site Scripting (XSS)", "upgradePath": [], "version": "1.16.1-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/gmp@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/libgmpxx@6.2.0-r0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/gmp-dev@6.2.0-r0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/libgmpxx@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/libgmpxx", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/libgmpxx@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/gmp-dev@6.2.0-r0", "gmp/libgmpxx@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/libgmpxx", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/gmp-dev@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp-dev", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/gmp-dev@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-11-21T03:45:00.394040Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T18:07:03.202306Z", "severity": "medium" } ], "cvssScore": 5.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `musl` package and not the `musl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).\n## Remediation\nUpgrade `Alpine:3.12` `musl` to version 1.1.24-r10 or higher.\n## References\n- [CONFIRM](http://www.openwall.com/lists/oss-security/2020/11/20/4)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/)\n- [MISC](https://musl.libc.org/releases.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n", "disclosureTime": "2020-11-24T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17761", "probability": "0.00051" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "musl/musl-utils@1.1.24-r9" ], "id": "SNYK-ALPINE312-MUSL-1042762", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-28928" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T16:10:43.545616Z", "name": "musl/musl-utils", "nearestFixedInVersion": "1.1.24-r10", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "musl", "patches": [], "publicationTime": "2020-11-21T03:45:00.333919Z", "references": [ { "title": "CONFIRM", "url": "http://www.openwall.com/lists/oss-security/2020/11/20/4" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/" }, { "title": "MISC", "url": "https://musl.libc.org/releases.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.24-r10" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "musl/musl-utils@1.1.24-r10" ], "version": "1.1.24-r9" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-11-21T03:45:00.394040Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T18:07:03.202306Z", "severity": "medium" } ], "cvssScore": 5.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `musl` package and not the `musl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).\n## Remediation\nUpgrade `Alpine:3.12` `musl` to version 1.1.24-r10 or higher.\n## References\n- [CONFIRM](http://www.openwall.com/lists/oss-security/2020/11/20/4)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/)\n- [MISC](https://musl.libc.org/releases.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n", "disclosureTime": "2020-11-24T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17761", "probability": "0.00051" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libc-dev/libc-utils@0.7.2-r3", "musl/musl-utils@1.1.24-r9" ], "id": "SNYK-ALPINE312-MUSL-1042762", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-28928" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T16:10:43.545616Z", "name": "musl/musl-utils", "nearestFixedInVersion": "1.1.24-r10", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "musl", "patches": [], "publicationTime": "2020-11-21T03:45:00.333919Z", "references": [ { "title": "CONFIRM", "url": "http://www.openwall.com/lists/oss-security/2020/11/20/4" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/" }, { "title": "MISC", "url": "https://musl.libc.org/releases.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.24-r10" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.1.24-r9" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-11-21T03:45:00.394040Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T18:07:03.202306Z", "severity": "medium" } ], "cvssScore": 5.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `musl` package and not the `musl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).\n## Remediation\nUpgrade `Alpine:3.12` `musl` to version 1.1.24-r10 or higher.\n## References\n- [CONFIRM](http://www.openwall.com/lists/oss-security/2020/11/20/4)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/)\n- [MISC](https://musl.libc.org/releases.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n", "disclosureTime": "2020-11-24T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17761", "probability": "0.00051" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "musl/musl@1.1.24-r9" ], "id": "SNYK-ALPINE312-MUSL-1042762", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-28928" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T16:10:43.545616Z", "name": "musl/musl", "nearestFixedInVersion": "1.1.24-r10", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "musl", "patches": [], "publicationTime": "2020-11-21T03:45:00.333919Z", "references": [ { "title": "CONFIRM", "url": "http://www.openwall.com/lists/oss-security/2020/11/20/4" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/" }, { "title": "MISC", "url": "https://musl.libc.org/releases.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.24-r10" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "musl/musl@1.1.24-r10" ], "version": "1.1.24-r9" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ncurses/ncurses-terminfo-base@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-terminfo-base", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "ncurses/ncurses-terminfo-base@6.2_p20200523-r1" ], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ncurses/ncurses-libs@6.2_p20200523-r0", "ncurses/ncurses-terminfo-base@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-terminfo-base", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "ncurses/ncurses-libs@6.2_p20200523-r1" ], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "procps/procps@3.3.16-r0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "readline/readline@8.0.4-r0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-01-08T03:45:00.784104Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T17:35:25.715360Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-04-07T01:11:05.197184Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-06-25T12:12:56.524936Z", "severity": "high" } ], "cvssScore": 8.1, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210212-0003/)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4826)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/988103)\n- [MISC](https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-01-06T21:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.70263", "probability": "0.00410" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8265" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-06-25T12:12:56.524936Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.790327Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4826" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/988103" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-01-08T03:45:00.898300Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:00:10.673760Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:53:14.116637Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-11T01:11:04.683193Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEJBY3RJB3XWUOJFGZM5E3EMQ7MFM3UT/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXLJY4764LYVJPC7NCDLE2UMQ3QC5OI2/)\n- [GENTOO](https://security.gentoo.org/glsa/202012-11)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/1033107)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-11-19T01:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74397", "probability": "0.00554" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056732", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8277" ], "CWE": [ "CWE-400" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:49:07.442606Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.902770Z", "references": [ { "title": "CONFIRM", "url": "https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEJBY3RJB3XWUOJFGZM5E3EMQ7MFM3UT/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXLJY4764LYVJPC7NCDLE2UMQ3QC5OI2/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-11" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/1033107" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Resource Exhaustion", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "cpes": [], "creationTime": "2021-01-08T03:45:00.957066Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "modificationTime": "2022-04-07T01:11:05.257566Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "modificationTime": "2022-09-01T17:35:36.532399Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "modificationTime": "2022-05-03T22:46:58.043348Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210212-0003/)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4826)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/1002188)\n- [MISC](https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html)\n", "disclosureTime": "2021-01-06T21:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64780", "probability": "0.00293" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056733", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8287" ], "CWE": [ "CWE-444" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:03:31.957847Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.963884Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4826" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/1002188" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "HTTP Request Smuggling", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-24T03:45:04.485794Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:33:07.801355Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T17:37:27.207737Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T01:10:32.573925Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.21.0-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210416-0001/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/)\n- [MISC](https://hackerone.com/reports/1043360)\n- [MISC](https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-03-03T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66049", "probability": "0.00315" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1078726", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22883" ], "CWE": [ "CWE-400" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:46:31.635305Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.21.0-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-02-24T03:45:04.496405Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1043360" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.21.0-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Resource Exhaustion", "upgradePath": [ false, "nodejs/nodejs@12.21.0-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-02-24T03:45:04.566620Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T17:37:24.368344Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "modificationTime": "2022-05-03T22:33:20.414275Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-04-07T01:11:06.839918Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.21.0-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210416-0001/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210723-0001/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/)\n- [MISC](https://hackerone.com/reports/1069487)\n- [MISC](https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/)\n- [MISC](https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-03-03T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.59368", "probability": "0.00222" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1078727", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22884" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:46:31.359745Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.21.0-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-02-24T03:45:04.572981Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1069487" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/%23node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.21.0-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2021-22884", "upgradePath": [ false, "nodejs/nodejs@12.21.0-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "cpes": [], "creationTime": "2021-07-27T14:10:05.141123Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "modificationTime": "2022-05-03T21:56:00.051012Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "modificationTime": "2022-04-07T01:11:03.625007Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "modificationTime": "2022-11-27T21:08:23.974295Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.2-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210805-0003/)\n- [MISC](https://hackerone.com/reports/1209681)\n- [MISC](https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-07-12T11:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.38709", "probability": "0.00094" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1533757", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22918" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:41:21.529206Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.2-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-07-27T14:09:43.470944Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210805-0003/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1209681" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.2-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "nodejs/nodejs@12.22.2-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-07-30T05:14:52.448150Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-04T01:11:14.996041Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 9.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-08-20T11:02:24.706790Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T21:07:21.935348Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.4-r0 or higher.\n## References\n- [MISC](https://hackerone.com/reports/1238162)\n- [MISC](https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20211112-0002/)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2021-10-07T14:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.48923", "probability": "0.00142" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1535111", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22930" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:49:11.427812Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.4-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-07-30T05:14:37.952619Z", "references": [ { "title": "MISC", "url": "https://hackerone.com/reports/1238162" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20211112-0002/" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.4-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "nodejs/nodejs@12.22.4-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-02T17:49:07.947461Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-15T01:10:30.866399Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-09-01T17:35:19.289005Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-05-03T21:55:35.206553Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.1-r0 or higher.\n## References\n- [MISC](https://github.com/yargs/y18n/issues/96)\n- [MISC](https://github.com/yargs/y18n/pull/108)\n- [MISC](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306)\n- [MISC](https://snyk.io/vuln/SNYK-JS-Y18N-1021887)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [report@snyk.io](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2020-11-17T13:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.96810", "probability": "0.42445" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1535426", "identifiers": { "ALTERNATIVE": [ "SNYK-ALPINE312-NODEJS-1244058" ], "CVE": [ "CVE-2020-7774" ], "CWE": [ "CWE-20" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:48:35.611704Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.1-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-02T17:48:55.135195Z", "references": [ { "title": "MISC", "url": "https://github.com/yargs/y18n/issues/96" }, { "title": "MISC", "url": "https://github.com/yargs/y18n/pull/108" }, { "title": "MISC", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306" }, { "title": "MISC", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "report@snyk.io", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.1-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Improper Input Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "cpes": [], "creationTime": "2021-08-27T02:21:24.564029Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:49:40.126160Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:19:02.911789Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-10-19T01:10:42.171066Z", "severity": "medium" } ], "cvssScore": 5.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.5-r0 or higher.\n## References\n- [secalert@redhat.com](https://c-ares.haxx.se/adv_20210810.html)\n- [secalert@redhat.com](https://bugzilla.redhat.com/show_bug.cgi?id=1988342)\n- [secalert@redhat.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [secalert@redhat.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-11-23T19:15:07.877000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.51121", "probability": "0.00157" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1570153", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3672" ], "CWE": [ "CWE-79" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:34:32.468732Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.5-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-11T15:48:12.535347Z", "references": [ { "title": "secalert@redhat.com", "url": "https://c-ares.haxx.se/adv_20210810.html" }, { "title": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "title": "secalert@redhat.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.5-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Cross-site Scripting (XSS)", "upgradePath": [ false, "nodejs/nodejs@12.22.5-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-27T02:21:26.603675Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:46:32.415735Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-13T01:11:13.423704Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:07:15.940491Z", "severity": "medium" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.5-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210923-0001/)\n- [MISC](https://hackerone.com/reports/1178337)\n- [MISC](https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-08-16T19:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.80869", "probability": "0.00938" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1570154", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22931" ], "CWE": [ "CWE-20" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:41:44.818762Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.5-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-27T02:21:26.588823Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210923-0001/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1178337" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.5-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Improper Input Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.5-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-08-27T02:22:06.913771Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 4.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "modificationTime": "2022-05-03T21:45:27.246278Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-11-27T21:11:37.311667Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-11-08T01:10:38.584226Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIf the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.5-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210917-0003/)\n- [MISC](https://hackerone.com/reports/1278254)\n- [MISC](https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2021-08-16T19:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64282", "probability": "0.00286" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1570155", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22939" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:41:27.821121Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.5-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-27T02:22:06.900419Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210917-0003/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1278254" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.5-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.5-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:52:45.120618Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:35.689720Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:39.668619Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-13T21:08:20.388255Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://www.debian.org/security/2021/dsa-5008)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [security-advisories@github.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.43105", "probability": "0.00110" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579558", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37701" ], "CWE": [ "CWE-22", "CWE-59" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:16.704913Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:45.085295Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:56:42.755244Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-01T22:08:18.435850Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:58.758987Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.8, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-26T01:11:09.743428Z", "severity": "high" } ], "cvssScore": 7.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\n`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2)\n- [MISC](https://www.npmjs.com/package/@npmcli/arborist)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.21051", "probability": "0.00056" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579564", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39135" ], "CWE": [ "CWE-61" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:45.318296Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:58.417145Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2" }, { "title": "MISC", "url": "https://www.npmjs.com/package/@npmcli/arborist" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Symlink Following", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:56:44.201376Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-01T22:08:17.754315Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:56.263465Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.8, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-13T01:11:12.420921Z", "severity": "high" } ], "cvssScore": 7.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\n`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc)\n- [MISC](https://www.npmjs.com/package/@npmcli/arborist)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.21051", "probability": "0.00056" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579565", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39134" ], "CWE": [ "CWE-61" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:43.551881Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:45.930629Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc" }, { "title": "MISC", "url": "https://www.npmjs.com/package/@npmcli/arborist" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Symlink Following", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:57:36.110283Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:18:12.740276Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:36.631320Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.23142", "probability": "0.00059" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579568", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37713" ], "CWE": [ "CWE-22" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:14.550265Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:47.673713Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:57:37.106435Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:35.782070Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:18:09.683772Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-13T18:47:58.237883Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://www.debian.org/security/2021/dsa-5008)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [security-advisories@github.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.43105", "probability": "0.00110" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579570", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37712" ], "CWE": [ "CWE-22", "CWE-59" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-23T13:10:08.866305Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:56:45.097974Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2022-02-08T04:08:40.858572Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "modificationTime": "2022-05-03T21:08:39.281836Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-11-27T15:36:43.053354Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-06T01:10:23.947787Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1429694)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2022-02-24T19:15:09.360000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57569", "probability": "0.00208" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395501", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-44532" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:37:58.447411Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:09:39.193665Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1429694" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2022-02-08T04:08:45.973270Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-06T18:10:41.592799Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "modificationTime": "2022-05-03T21:08:32.830815Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-11-27T15:36:35.842656Z", "severity": "high" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.Affected versions of Node.js that do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1429694)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2022-02-24T19:15:09.407000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53817", "probability": "0.00178" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395502", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-44533" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:37:59.092081Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:09:27.620741Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1429694" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "cpes": [], "creationTime": "2022-02-08T04:09:17.766649Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-10T13:11:44.806068Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 4, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "modificationTime": "2022-05-18T11:06:41.716474Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-27T15:54:40.753215Z", "severity": "high" } ], "cvssScore": 8.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nDue to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1431042)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2022-02-24T19:15:10.080000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69401", "probability": "0.00386" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395503", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-21824" ], "CWE": [ "CWE-1321" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:37:46.710514Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:11:19.546760Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1431042" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "cpes": [], "creationTime": "2022-02-08T04:09:20.686628Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "modificationTime": "2022-08-20T11:03:12.656333Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "modificationTime": "2022-06-29T01:11:24.350009Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "modificationTime": "2022-11-27T14:56:03.318315Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1238099)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n", "disclosureTime": "2021-11-03T20:15:08.247000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54299", "probability": "0.00182" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395504", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22960" ], "CWE": [ "CWE-444" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:55.630342Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-10-13T15:40:04.964754Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1238099" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "HTTP Request Smuggling", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "cpes": [], "creationTime": "2022-02-08T04:09:42.552634Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "modificationTime": "2022-06-29T01:11:24.458260Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "modificationTime": "2022-08-20T11:02:57.621581Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "modificationTime": "2022-11-27T14:55:59.031061Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1238709)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n", "disclosureTime": "2021-11-15T15:15:06.747000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54299", "probability": "0.00182" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395505", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22959" ], "CWE": [ "CWE-444" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:32:03.024419Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-10-13T15:40:13.352528Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1238709" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "HTTP Request Smuggling", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2022-02-08T04:09:49.776451Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "modificationTime": "2022-05-03T21:08:20.444849Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-11-27T15:37:45.416905Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-10-06T01:10:21.886995Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAccepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1429694)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2022-02-24T19:15:09.313000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54091", "probability": "0.00181" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395506", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-44531" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:38:08.686069Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:08:20.926477Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1429694" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1i-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1n-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [ false, "openssl/libssl1.1@1.1.1i-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libssl1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libssl1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [ false, "openssl/libssl1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [ false, "openssl/libssl1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "openssl/libssl1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "openssl/libssl1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [ false, "openssl/libssl1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [ false, "openssl/libssl1.1@1.1.1n-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-04-08T03:45:07.986869Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2022-09-01T16:09:49.287967Z", "severity": "low" }, { "assigner": "SUSE", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-11T11:02:57.467625Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T16:34:00.196643Z", "severity": "medium" } ], "cvssScore": 5.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `tar` package and not the `tar` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.\n## Remediation\nUpgrade `Alpine:3.12` `tar` to version 1.32-r2 or higher.\n## References\n- [GENTOO](https://security.gentoo.org/glsa/202105-29)\n- [MISC](https://bugzilla.redhat.com/show_bug.cgi?id=1917565)\n- [MISC](https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777)\n- [MISC](https://savannah.gnu.org/bugs/?59897)\n", "disclosureTime": "2021-03-26T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.27494", "probability": "0.00067" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "tar/tar@1.32-r1" ], "id": "SNYK-ALPINE312-TAR-1244062", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-20193" ], "CWE": [ "CWE-125", "CWE-401" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T16:50:11.601288Z", "name": "tar/tar", "nearestFixedInVersion": "1.32-r2", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "tar", "patches": [], "publicationTime": "2021-04-07T03:45:08.013253Z", "references": [ { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-29" }, { "title": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917565" }, { "title": "MISC", "url": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777" }, { "title": "MISC", "url": "https://savannah.gnu.org/bugs/?59897" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.32-r2" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "tar/tar@1.32-r2" ], "version": "1.32-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib@1.2.12-r0" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib@1.2.12-r2" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib-dev@1.2.11-r3", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib-dev@1.2.11-r3", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib-dev@1.2.12-r0" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib-dev@1.2.12-r2" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" } ] }, "created_at": 1694616243.150179, "has_audit_package": true } }, "repo_url": "https://github.com/cyber-dojo/shas", "template": [ "artifact", "branch-coverage" ], "last_modified_at": 1694616243.150179, "deployments": [ 46, 45 ], "state": "NON-COMPLIANT", "html_url": "https://app.kosli.com/cyber-dojo/flows/shas-archived-at-1705491385/artifacts/5131e85ad9520497bb488841b571c00853366ea0352b5c8606e064c31db57a39", "api_url": "https://app.kosli.com/api/v2/artifacts/cyber-dojo/shas-archived-at-1705491385/fingerprint/5131e85ad9520497bb488841b571c00853366ea0352b5c8606e064c31db57a39" }
Artifact Information |
|
Name | cyberdojo/shas:26b59d0 |
Fingerprint | 5131e85ad9520497bb488841b571c00853366ea0352b5c8606e064c31db57a39 |
Git commit | 26b59d0 |
CI Build | https://github.com/cyber-dojo/shas/actions/runs/5891977237 |
Running | - |
Exited | aws-prod#987 |
Last modified | 1694616243.150179 • 8 months ago |
Approvals
None |
Evidence
Evidence for 'branch-coverage'
{ "evidence_type": "generic", "name": "branch-coverage", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/shas/actions/runs/5891977237", "description": "server & client branch-coverage reports", "user_data": { "client": { "command_name": "Minitest", "groups": { "app": { "branches": { "covered": 1, "missed": 1, "total": 2 }, "lines": { "covered": 52, "missed": 0, "total": 52 } }, "test": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 0, "missed": 0, "total": 0 } } }, "timestamp": 1694003989 }, "server": { "command_name": "Minitest", "groups": { "app": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 69, "missed": 0, "total": 69 } }, "test": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 0, "missed": 0, "total": 0 } } }, "timestamp": 1694003977 } }, "created_at": 1694004002.466227, "has_audit_package": false }
Evidence for 'snyk-scan'
{ "evidence_type": "snyk", "name": "snyk-scan", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/shas/actions/runs/5891977237", "evidence_archive_fingerprint": "2cc8f4952a65435c1a08a29752d6b3b22fe6257ff61a1622e4e5516f46101f69", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/local/bundle/gems/concurrent-ruby-1.1.7/lib/concurrent-ruby/concurrent", "docker": {}, "filesystemPolicy": false, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "fayesgw", "packageManager": "maven", "path": "cyberdojo/shas:26b59d0/shas:26b59d0:/usr/local/bundle/gems/concurrent-ruby-1.1.7/lib/concurrent-ruby/concurrent", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "cyberdojo/shas:26b59d0:/usr/local/bundle/gems/concurrent-ruby-1.1.7/lib/concurrent-ruby/concurrent", "summary": "No known vulnerabilities", "targetFile": "/usr/local/bundle/gems/concurrent-ruby-1.1.7/lib/concurrent-ruby/concurrent", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 45, "docker": { "baseImage": "ruby:2-alpine", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Your base image is out of date" }, { "message": "1) Pull the latest version of your base image by running 'docker pull ruby:2-alpine'" }, { "message": "2) Rebuild your local image" }, { "bold": true, "color": "yellow", "message": "Alpine 3.12.1 is no longer supported by the Alpine maintainers. Vulnerability detection may be affected by a lack of security updates." } ], "baseImageOutdated": true, "code": "OUTDATED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": false, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "fayesgw", "packageManager": "apk", "path": "cyberdojo/shas:26b59d0/shas", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/shas", "summary": "229 vulnerable dependency paths", "uniqueCount": 53, "vulnerabilities": [ { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-04-15T03:45:07.931682Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T16:38:38.769177Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `apk-tools` package and not the `apk-tools` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn Alpine Linux apk-tools before 2.12.5, the tarball parser allows a buffer overflow and crash.\n## Remediation\nUpgrade `Alpine:3.12` `apk-tools` to version 2.10.6-r0 or higher.\n## References\n- [MISC](https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741)\n- [MISC](https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606)\n", "disclosureTime": "2021-04-21T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.37847", "probability": "0.00091" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1" ], "id": "SNYK-ALPINE312-APKTOOLS-1246338", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-30139" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T14:22:12.399050Z", "name": "apk-tools/apk-tools", "nearestFixedInVersion": "2.10.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "apk-tools", "patches": [], "publicationTime": "2021-04-15T03:45:07.947271Z", "references": [ { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741" }, { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<2.10.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "apk-tools/apk-tools@2.10.6-r0" ], "version": "2.10.5-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-07-27T14:06:41.093570Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-01-03T16:44:39.243547Z", "severity": "critical" } ], "cvssScore": 9.1, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `apk-tools` package and not the `apk-tools` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nlibfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the '\\0' terminator one byte too late.\n## Remediation\nUpgrade `Alpine:3.12` `apk-tools` to version 2.10.7-r0 or higher.\n## References\n- [MISC](https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch)\n- [MISC](https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749)\n- [MLIST](https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E)\n", "disclosureTime": "2021-08-03T14:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.48882", "probability": "0.00142" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1" ], "id": "SNYK-ALPINE312-APKTOOLS-1533753", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-36159" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T14:21:26.261460Z", "name": "apk-tools/apk-tools", "nearestFixedInVersion": "2.10.7-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "apk-tools", "patches": [], "publicationTime": "2021-07-27T14:06:38.323743Z", "references": [ { "title": "MISC", "url": "https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch" }, { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<2.10.7-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "apk-tools/apk-tools@2.10.7-r0" ], "version": "2.10.5-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [ false, "busybox/busybox@1.31.1-r20" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [ false, "busybox/busybox@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [ false, "busybox/busybox@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r20" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "cpes": [], "creationTime": "2021-11-12T15:54:19.394197Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-17T11:09:34.722416Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-04-01T01:10:54.392634Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.7, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "modificationTime": "2022-11-27T20:26:44.283682Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.540000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17229", "probability": "0.00050" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920717", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42374" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.852874Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-11T16:06:33.834204Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": null, "cpes": [], "creationTime": "2022-04-10T16:29:28.949037Z", "credit": [ "" ], "cvssDetails": [], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2606933", "identifiers": { "ALPINE": [ "ALPINE-13661" ], "ALTERNATIVE": [], "CVE": [], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-04-10T16:29:28.954647Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": null, "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-10T16:27:46.414545Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "ALPINE-13661", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "cpes": [], "creationTime": "2021-08-11T15:50:37.172366Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:49:40.126160Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:19:02.911789Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-10-19T01:10:42.171066Z", "severity": "medium" } ], "cvssScore": 5.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `c-ares` package and not the `c-ares` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.\n## Remediation\nUpgrade `Alpine:3.12` `c-ares` to version 1.17.2-r0 or higher.\n## References\n- [secalert@redhat.com](https://c-ares.haxx.se/adv_20210810.html)\n- [secalert@redhat.com](https://bugzilla.redhat.com/show_bug.cgi?id=1988342)\n- [secalert@redhat.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [secalert@redhat.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-11-23T19:15:07.877000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.51121", "probability": "0.00157" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "c-ares/c-ares@1.16.1-r0" ], "id": "SNYK-ALPINE312-CARES-1540337", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3672" ], "CWE": [ "CWE-79" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:34:32.468732Z", "name": "c-ares/c-ares", "nearestFixedInVersion": "1.17.2-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "c-ares", "patches": [], "publicationTime": "2021-08-11T15:48:12.535347Z", "references": [ { "title": "secalert@redhat.com", "url": "https://c-ares.haxx.se/adv_20210810.html" }, { "title": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "title": "secalert@redhat.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.17.2-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Cross-site Scripting (XSS)", "upgradePath": [ false, "c-ares/c-ares@1.17.2-r0" ], "version": "1.16.1-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "cpes": [], "creationTime": "2021-08-11T15:50:37.172366Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:49:40.126160Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:19:02.911789Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-10-19T01:10:42.171066Z", "severity": "medium" } ], "cvssScore": 5.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `c-ares` package and not the `c-ares` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.\n## Remediation\nUpgrade `Alpine:3.12` `c-ares` to version 1.17.2-r0 or higher.\n## References\n- [secalert@redhat.com](https://c-ares.haxx.se/adv_20210810.html)\n- [secalert@redhat.com](https://bugzilla.redhat.com/show_bug.cgi?id=1988342)\n- [secalert@redhat.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [secalert@redhat.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-11-23T19:15:07.877000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.51121", "probability": "0.00157" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "c-ares/c-ares@1.16.1-r0" ], "id": "SNYK-ALPINE312-CARES-1540337", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3672" ], "CWE": [ "CWE-79" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:34:32.468732Z", "name": "c-ares/c-ares", "nearestFixedInVersion": "1.17.2-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "c-ares", "patches": [], "publicationTime": "2021-08-11T15:48:12.535347Z", "references": [ { "title": "secalert@redhat.com", "url": "https://c-ares.haxx.se/adv_20210810.html" }, { "title": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "title": "secalert@redhat.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.17.2-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Cross-site Scripting (XSS)", "upgradePath": [], "version": "1.16.1-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/gmp@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/libgmpxx@6.2.0-r0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/gmp-dev@6.2.0-r0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/libgmpxx@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/libgmpxx", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/libgmpxx@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/gmp-dev@6.2.0-r0", "gmp/libgmpxx@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/libgmpxx", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "gmp/gmp-dev@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp-dev", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/gmp-dev@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-11-21T03:45:00.394040Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T18:07:03.202306Z", "severity": "medium" } ], "cvssScore": 5.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `musl` package and not the `musl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).\n## Remediation\nUpgrade `Alpine:3.12` `musl` to version 1.1.24-r10 or higher.\n## References\n- [CONFIRM](http://www.openwall.com/lists/oss-security/2020/11/20/4)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/)\n- [MISC](https://musl.libc.org/releases.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n", "disclosureTime": "2020-11-24T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17761", "probability": "0.00051" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "musl/musl-utils@1.1.24-r9" ], "id": "SNYK-ALPINE312-MUSL-1042762", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-28928" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T16:10:43.545616Z", "name": "musl/musl-utils", "nearestFixedInVersion": "1.1.24-r10", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "musl", "patches": [], "publicationTime": "2020-11-21T03:45:00.333919Z", "references": [ { "title": "CONFIRM", "url": "http://www.openwall.com/lists/oss-security/2020/11/20/4" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/" }, { "title": "MISC", "url": "https://musl.libc.org/releases.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.24-r10" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "musl/musl-utils@1.1.24-r10" ], "version": "1.1.24-r9" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-11-21T03:45:00.394040Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T18:07:03.202306Z", "severity": "medium" } ], "cvssScore": 5.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `musl` package and not the `musl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).\n## Remediation\nUpgrade `Alpine:3.12` `musl` to version 1.1.24-r10 or higher.\n## References\n- [CONFIRM](http://www.openwall.com/lists/oss-security/2020/11/20/4)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/)\n- [MISC](https://musl.libc.org/releases.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n", "disclosureTime": "2020-11-24T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17761", "probability": "0.00051" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libc-dev/libc-utils@0.7.2-r3", "musl/musl-utils@1.1.24-r9" ], "id": "SNYK-ALPINE312-MUSL-1042762", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-28928" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T16:10:43.545616Z", "name": "musl/musl-utils", "nearestFixedInVersion": "1.1.24-r10", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "musl", "patches": [], "publicationTime": "2020-11-21T03:45:00.333919Z", "references": [ { "title": "CONFIRM", "url": "http://www.openwall.com/lists/oss-security/2020/11/20/4" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/" }, { "title": "MISC", "url": "https://musl.libc.org/releases.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.24-r10" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.1.24-r9" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-11-21T03:45:00.394040Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T18:07:03.202306Z", "severity": "medium" } ], "cvssScore": 5.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `musl` package and not the `musl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).\n## Remediation\nUpgrade `Alpine:3.12` `musl` to version 1.1.24-r10 or higher.\n## References\n- [CONFIRM](http://www.openwall.com/lists/oss-security/2020/11/20/4)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/)\n- [MISC](https://musl.libc.org/releases.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n", "disclosureTime": "2020-11-24T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.17761", "probability": "0.00051" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "musl/musl@1.1.24-r9" ], "id": "SNYK-ALPINE312-MUSL-1042762", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-28928" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T16:10:43.545616Z", "name": "musl/musl", "nearestFixedInVersion": "1.1.24-r10", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "musl", "patches": [], "publicationTime": "2020-11-21T03:45:00.333919Z", "references": [ { "title": "CONFIRM", "url": "http://www.openwall.com/lists/oss-security/2020/11/20/4" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKQ3RVSMVZNZNO4D65W2CZZ4DMYFZN2Q/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UW27QVY7ERPTSGKS4KAWE5TU7EJWHKVQ/" }, { "title": "MISC", "url": "https://musl.libc.org/releases.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r2134abfe847bea7795f0e53756d10a47e6643f35ab8169df8b8a9eb1@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r90b60cf49348e515257b4950900c1bd3ab95a960cf2469d919c7264e@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/ra63e8dc5137d952afc55dbbfa63be83304ecf842d1eab1ff3ebb29e2@%3Cnotifications.apisix.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00050.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.24-r10" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "musl/musl@1.1.24-r10" ], "version": "1.1.24-r9" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ncurses/ncurses-terminfo-base@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-terminfo-base", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "ncurses/ncurses-terminfo-base@6.2_p20200523-r1" ], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ncurses/ncurses-libs@6.2_p20200523-r0", "ncurses/ncurses-terminfo-base@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-terminfo-base", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "ncurses/ncurses-libs@6.2_p20200523-r1" ], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "procps/procps@3.3.16-r0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "readline/readline@8.0.4-r0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-01-08T03:45:00.784104Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T17:35:25.715360Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-04-07T01:11:05.197184Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-06-25T12:12:56.524936Z", "severity": "high" } ], "cvssScore": 8.1, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210212-0003/)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4826)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/988103)\n- [MISC](https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-01-06T21:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.70263", "probability": "0.00410" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8265" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-06-25T12:12:56.524936Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.790327Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4826" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/988103" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-01-08T03:45:00.898300Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:00:10.673760Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:53:14.116637Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-11T01:11:04.683193Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEJBY3RJB3XWUOJFGZM5E3EMQ7MFM3UT/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXLJY4764LYVJPC7NCDLE2UMQ3QC5OI2/)\n- [GENTOO](https://security.gentoo.org/glsa/202012-11)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/1033107)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-11-19T01:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74397", "probability": "0.00554" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056732", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8277" ], "CWE": [ "CWE-400" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:49:07.442606Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.902770Z", "references": [ { "title": "CONFIRM", "url": "https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEJBY3RJB3XWUOJFGZM5E3EMQ7MFM3UT/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXLJY4764LYVJPC7NCDLE2UMQ3QC5OI2/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-11" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/1033107" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Resource Exhaustion", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "cpes": [], "creationTime": "2021-01-08T03:45:00.957066Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "modificationTime": "2022-04-07T01:11:05.257566Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "modificationTime": "2022-09-01T17:35:36.532399Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "modificationTime": "2022-05-03T22:46:58.043348Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210212-0003/)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4826)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/1002188)\n- [MISC](https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html)\n", "disclosureTime": "2021-01-06T21:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64780", "probability": "0.00293" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056733", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8287" ], "CWE": [ "CWE-444" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:03:31.957847Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.963884Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4826" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/1002188" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00009.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "HTTP Request Smuggling", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-24T03:45:04.485794Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:33:07.801355Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T17:37:27.207737Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T01:10:32.573925Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.21.0-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210416-0001/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/)\n- [MISC](https://hackerone.com/reports/1043360)\n- [MISC](https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-03-03T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66049", "probability": "0.00315" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1078726", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22883" ], "CWE": [ "CWE-400" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:46:31.635305Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.21.0-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-02-24T03:45:04.496405Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1043360" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.21.0-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Resource Exhaustion", "upgradePath": [ false, "nodejs/nodejs@12.21.0-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-02-24T03:45:04.566620Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T17:37:24.368344Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "modificationTime": "2022-05-03T22:33:20.414275Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-04-07T01:11:06.839918Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.21.0-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210416-0001/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210723-0001/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/)\n- [MISC](https://hackerone.com/reports/1069487)\n- [MISC](https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/)\n- [MISC](https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-03-03T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.59368", "probability": "0.00222" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1078727", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22884" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:46:31.359745Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.21.0-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-02-24T03:45:04.572981Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1069487" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/%23node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.21.0-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2021-22884", "upgradePath": [ false, "nodejs/nodejs@12.21.0-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "cpes": [], "creationTime": "2021-07-27T14:10:05.141123Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "modificationTime": "2022-05-03T21:56:00.051012Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "modificationTime": "2022-04-07T01:11:03.625007Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "modificationTime": "2022-11-27T21:08:23.974295Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.2-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210805-0003/)\n- [MISC](https://hackerone.com/reports/1209681)\n- [MISC](https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-07-12T11:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.38709", "probability": "0.00094" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1533757", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22918" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:41:21.529206Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.2-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-07-27T14:09:43.470944Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210805-0003/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1209681" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.2-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "nodejs/nodejs@12.22.2-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-07-30T05:14:52.448150Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-04T01:11:14.996041Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 9.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-08-20T11:02:24.706790Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T21:07:21.935348Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.4-r0 or higher.\n## References\n- [MISC](https://hackerone.com/reports/1238162)\n- [MISC](https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20211112-0002/)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2021-10-07T14:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.48923", "probability": "0.00142" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1535111", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22930" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:49:11.427812Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.4-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-07-30T05:14:37.952619Z", "references": [ { "title": "MISC", "url": "https://hackerone.com/reports/1238162" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20211112-0002/" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.4-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "nodejs/nodejs@12.22.4-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-02T17:49:07.947461Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-15T01:10:30.866399Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-09-01T17:35:19.289005Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-05-03T21:55:35.206553Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.1-r0 or higher.\n## References\n- [MISC](https://github.com/yargs/y18n/issues/96)\n- [MISC](https://github.com/yargs/y18n/pull/108)\n- [MISC](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306)\n- [MISC](https://snyk.io/vuln/SNYK-JS-Y18N-1021887)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [report@snyk.io](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2020-11-17T13:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.96810", "probability": "0.42445" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1535426", "identifiers": { "ALTERNATIVE": [ "SNYK-ALPINE312-NODEJS-1244058" ], "CVE": [ "CVE-2020-7774" ], "CWE": [ "CWE-20" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:48:35.611704Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.1-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-02T17:48:55.135195Z", "references": [ { "title": "MISC", "url": "https://github.com/yargs/y18n/issues/96" }, { "title": "MISC", "url": "https://github.com/yargs/y18n/pull/108" }, { "title": "MISC", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306" }, { "title": "MISC", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "report@snyk.io", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.1-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Improper Input Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "cpes": [], "creationTime": "2021-08-27T02:21:24.564029Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:49:40.126160Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:19:02.911789Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-10-19T01:10:42.171066Z", "severity": "medium" } ], "cvssScore": 5.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.5-r0 or higher.\n## References\n- [secalert@redhat.com](https://c-ares.haxx.se/adv_20210810.html)\n- [secalert@redhat.com](https://bugzilla.redhat.com/show_bug.cgi?id=1988342)\n- [secalert@redhat.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [secalert@redhat.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-11-23T19:15:07.877000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.51121", "probability": "0.00157" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1570153", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3672" ], "CWE": [ "CWE-79" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:34:32.468732Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.5-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-11T15:48:12.535347Z", "references": [ { "title": "secalert@redhat.com", "url": "https://c-ares.haxx.se/adv_20210810.html" }, { "title": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "title": "secalert@redhat.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.5-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Cross-site Scripting (XSS)", "upgradePath": [ false, "nodejs/nodejs@12.22.5-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-27T02:21:26.603675Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:46:32.415735Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-13T01:11:13.423704Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:07:15.940491Z", "severity": "medium" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.5-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210923-0001/)\n- [MISC](https://hackerone.com/reports/1178337)\n- [MISC](https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-08-16T19:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.80869", "probability": "0.00938" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1570154", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22931" ], "CWE": [ "CWE-20" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:41:44.818762Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.5-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-27T02:21:26.588823Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210923-0001/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1178337" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.5-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Improper Input Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.5-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-08-27T02:22:06.913771Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 4.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "modificationTime": "2022-05-03T21:45:27.246278Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-11-27T21:11:37.311667Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-11-08T01:10:38.584226Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIf the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.5-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210917-0003/)\n- [MISC](https://hackerone.com/reports/1278254)\n- [MISC](https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2021-08-16T19:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64282", "probability": "0.00286" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1570155", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22939" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:41:27.821121Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.5-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-27T02:22:06.900419Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210917-0003/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1278254" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.5-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.5-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:52:45.120618Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:35.689720Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:39.668619Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-13T21:08:20.388255Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://www.debian.org/security/2021/dsa-5008)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [security-advisories@github.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.43105", "probability": "0.00110" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579558", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37701" ], "CWE": [ "CWE-22", "CWE-59" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:16.704913Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:45.085295Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:56:42.755244Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-01T22:08:18.435850Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:58.758987Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.8, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-26T01:11:09.743428Z", "severity": "high" } ], "cvssScore": 7.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\n`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2)\n- [MISC](https://www.npmjs.com/package/@npmcli/arborist)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.21051", "probability": "0.00056" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579564", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39135" ], "CWE": [ "CWE-61" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:45.318296Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:58.417145Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2" }, { "title": "MISC", "url": "https://www.npmjs.com/package/@npmcli/arborist" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Symlink Following", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:56:44.201376Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-01T22:08:17.754315Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:56.263465Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.8, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-13T01:11:12.420921Z", "severity": "high" } ], "cvssScore": 7.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\n`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc)\n- [MISC](https://www.npmjs.com/package/@npmcli/arborist)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.21051", "probability": "0.00056" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579565", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39134" ], "CWE": [ "CWE-61" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:43.551881Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:45.930629Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc" }, { "title": "MISC", "url": "https://www.npmjs.com/package/@npmcli/arborist" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Symlink Following", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:57:36.110283Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:18:12.740276Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:36.631320Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.23142", "probability": "0.00059" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579568", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37713" ], "CWE": [ "CWE-22" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:14.550265Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:47.673713Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:57:37.106435Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:35.782070Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:18:09.683772Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-13T18:47:58.237883Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://www.debian.org/security/2021/dsa-5008)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [security-advisories@github.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.43105", "probability": "0.00110" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579570", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37712" ], "CWE": [ "CWE-22", "CWE-59" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-23T13:10:08.866305Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:56:45.097974Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2022-02-08T04:08:40.858572Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "modificationTime": "2022-05-03T21:08:39.281836Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-11-27T15:36:43.053354Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-06T01:10:23.947787Z", "severity": "medium" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1429694)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2022-02-24T19:15:09.360000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57569", "probability": "0.00208" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395501", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-44532" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:37:58.447411Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:09:39.193665Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1429694" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2022-02-08T04:08:45.973270Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-06T18:10:41.592799Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "modificationTime": "2022-05-03T21:08:32.830815Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-11-27T15:36:35.842656Z", "severity": "high" } ], "cvssScore": 5.3, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.Affected versions of Node.js that do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1429694)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2022-02-24T19:15:09.407000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53817", "probability": "0.00178" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395502", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-44533" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:37:59.092081Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:09:27.620741Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1429694" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "cpes": [], "creationTime": "2022-02-08T04:09:17.766649Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-10T13:11:44.806068Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 4, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "modificationTime": "2022-05-18T11:06:41.716474Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-27T15:54:40.753215Z", "severity": "high" } ], "cvssScore": 8.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nDue to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1431042)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2022-02-24T19:15:10.080000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69401", "probability": "0.00386" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395503", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-21824" ], "CWE": [ "CWE-1321" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:37:46.710514Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:11:19.546760Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1431042" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "cpes": [], "creationTime": "2022-02-08T04:09:20.686628Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "modificationTime": "2022-08-20T11:03:12.656333Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "modificationTime": "2022-06-29T01:11:24.350009Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "modificationTime": "2022-11-27T14:56:03.318315Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1238099)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n", "disclosureTime": "2021-11-03T20:15:08.247000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54299", "probability": "0.00182" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395504", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22960" ], "CWE": [ "CWE-444" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:55.630342Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-10-13T15:40:04.964754Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1238099" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "HTTP Request Smuggling", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "cpes": [], "creationTime": "2022-02-08T04:09:42.552634Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "modificationTime": "2022-06-29T01:11:24.458260Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "modificationTime": "2022-08-20T11:02:57.621581Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "modificationTime": "2022-11-27T14:55:59.031061Z", "severity": "medium" } ], "cvssScore": 6.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1238709)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n", "disclosureTime": "2021-11-15T15:15:06.747000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54299", "probability": "0.00182" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395505", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22959" ], "CWE": [ "CWE-444" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:32:03.024419Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-10-13T15:40:13.352528Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1238709" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "HTTP Request Smuggling", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2022-02-08T04:09:49.776451Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "modificationTime": "2022-05-03T21:08:20.444849Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-11-27T15:37:45.416905Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-10-06T01:10:21.886995Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAccepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1429694)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2022-02-24T19:15:09.313000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54091", "probability": "0.00181" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395506", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-44531" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:38:08.686069Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:08:20.926477Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1429694" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1i-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1n-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [ false, "openssl/libssl1.1@1.1.1i-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libssl1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libssl1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [ false, "openssl/libssl1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [ false, "openssl/libssl1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "openssl/libssl1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "openssl/libssl1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [ false, "openssl/libssl1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [ false, "openssl/libssl1.1@1.1.1n-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2020-12-12T03:45:01.596080Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:58:32.615386Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:50:35.518718Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:05.528914Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1i-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20201218-0005/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20201208.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2020-11)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2020/dsa-4807)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/)\n- [FREEBSD](https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc)\n- [GENTOO](https://security.gentoo.org/glsa/202012-13)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/09/14/2)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-12-08T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.68413", "probability": "0.00363" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1050745", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-1971" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:51:35.182781Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1i-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2020-12-12T03:45:01.609611Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201218-0005/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2020-11" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4807" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/" }, { "title": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-13" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/14/2" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1i-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.506840Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:30:40.116402Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T19:41:07.840018Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-08T01:10:56.402659Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://support.apple.com/kb/HT212528)\n- [CONFIRM](https://support.apple.com/kb/HT212529)\n- [CONFIRM](https://support.apple.com/kb/HT212534)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/67)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/68)\n- [FULLDISC](http://seclists.org/fulldisclosure/2021/May/70)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.65115", "probability": "0.00299" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075734", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23841" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:17.855389Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.370259Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212528" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212529" }, { "title": "CONFIRM", "url": "https://support.apple.com/kb/HT212534" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "title": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "cpes": [], "creationTime": "2021-02-17T15:45:08.595024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-09-01T22:07:51.151544Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 3.7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "modificationTime": "2022-10-29T13:11:02.948115Z", "severity": "low" } ], "cvssScore": 3.7, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nOpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30919ab80a478f2d81f2e9acdcca3fa4740cd547)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.53339", "probability": "0.00174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075736", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23839" ], "CWE": [ "CWE-326" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:06.715220Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "low", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.467564Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "Inadequate Encryption Strength", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-26T03:45:13.264566Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:27:03.698718Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:09:54.715634Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:11:01.536520Z", "severity": "medium" } ], "cvssScore": 5.9, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210513-0002/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-06)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4875)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.64766", "probability": "0.00292" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089237", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3449" ], "CWE": [ "CWE-476" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:52:04.163116Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:12.930575Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-06" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4875" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "NULL Pointer Dereference", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-04-08T03:45:07.986869Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2022-09-01T16:09:49.287967Z", "severity": "low" }, { "assigner": "SUSE", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-11T11:02:57.467625Z", "severity": "low" }, { "assigner": "NVD", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T16:34:00.196643Z", "severity": "medium" } ], "cvssScore": 5.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `tar` package and not the `tar` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.\n## Remediation\nUpgrade `Alpine:3.12` `tar` to version 1.32-r2 or higher.\n## References\n- [GENTOO](https://security.gentoo.org/glsa/202105-29)\n- [MISC](https://bugzilla.redhat.com/show_bug.cgi?id=1917565)\n- [MISC](https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777)\n- [MISC](https://savannah.gnu.org/bugs/?59897)\n", "disclosureTime": "2021-03-26T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.27494", "probability": "0.00067" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "tar/tar@1.32-r1" ], "id": "SNYK-ALPINE312-TAR-1244062", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-20193" ], "CWE": [ "CWE-125", "CWE-401" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T16:50:11.601288Z", "name": "tar/tar", "nearestFixedInVersion": "1.32-r2", "nvdSeverity": "medium", "packageManager": "alpine:3.12", "packageName": "tar", "patches": [], "publicationTime": "2021-04-07T03:45:08.013253Z", "references": [ { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-29" }, { "title": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917565" }, { "title": "MISC", "url": "https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777" }, { "title": "MISC", "url": "https://savannah.gnu.org/bugs/?59897" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.32-r2" ] }, "severity": "medium", "severityWithCritical": "medium", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "tar/tar@1.32-r2" ], "version": "1.32-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib@1.2.12-r0" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib@1.2.12-r2" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib-dev@1.2.11-r3", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib-dev@1.2.11-r3", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "apk-tools/apk-tools@2.10.5-r1", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "nodejs/nodejs@12.18.4-r0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib-dev@1.2.12-r0" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib-dev@1.2.12-r2" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@26b59d0", ".ruby-rundeps@20201022.054836", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" } ] }, "created_at": 1694616243.150179, "has_audit_package": true }