cyber-dojo
flows
shas-archived-at-1705491385
artifacts
e848375868ed49d39e9cd07dc852c319839d80762e800b67d5efa8e6656b0a01
By signing up, you agree to the
Terms of Service.
For more information about Kosli’s privacy practices, see the Kosli’s
Privacy Policy.
We’ll occasionally send you account-related emails.
We’ll occasionally send you account-related emails.
shas-archived-at-1705491385
UX for git+image shas
cyberdojo/shas:31c9f69
Non-compliant
Download Evidence Package
JSON
{ "created_at": 1694690162.3838098, "fingerprint": "e848375868ed49d39e9cd07dc852c319839d80762e800b67d5efa8e6656b0a01", "filename": "cyberdojo/shas:31c9f69", "git_commit": "31c9f69e1dbd39cefdc9c00925f9fcdabc7ee004", "build_url": "https://github.com/cyber-dojo/shas/actions/runs/6184645153", "commit_url": "https://github.com/cyber-dojo/shas/commit/31c9f69e1dbd39cefdc9c00925f9fcdabc7ee004", "evidence": { "branch-coverage": { "evidence_type": "generic", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/shas/actions/runs/6184645153", "description": "server & client branch-coverage reports", "user_data": { "client": { "command_name": "Minitest", "groups": { "app": { "branches": { "covered": 1, "missed": 1, "total": 2 }, "lines": { "covered": 52, "missed": 0, "total": 52 } }, "test": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 0, "missed": 0, "total": 0 } } }, "timestamp": 1694690151 }, "server": { "command_name": "Minitest", "groups": { "app": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 69, "missed": 0, "total": 69 } }, "test": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 0, "missed": 0, "total": 0 } } }, "timestamp": 1694690141 } }, "created_at": 1694690164.1323044, "has_audit_package": false }, "snyk-scan": { "evidence_type": "snyk", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/shas/actions/runs/6184645153", "evidence_archive_fingerprint": "d8393a929930d5d2848e1031a9a1875d0e238cbe26473f63abb20104b63c35d6", "user_data": {}, "snyk_results": { "dependencyCount": 45, "docker": { "baseImage": "ruby:2-alpine", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Your base image is out of date" }, { "message": "1) Pull the latest version of your base image by running 'docker pull ruby:2-alpine'" }, { "message": "2) Rebuild your local image" }, { "bold": true, "color": "yellow", "message": "Alpine 3.12.1 is no longer supported by the Alpine maintainers. Vulnerability detection may be affected by a lack of security updates." } ], "baseImageOutdated": true, "code": "OUTDATED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": false, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "jonjagger", "packageManager": "apk", "path": "cyberdojo/shas:31c9f69/shas", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/shas", "severityThreshold": "high", "summary": "157 high or critical severity vulnerable dependency paths", "uniqueCount": 36, "vulnerabilities": [ { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-04-15T03:45:07.931682Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T16:38:38.769177Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `apk-tools` package and not the `apk-tools` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn Alpine Linux apk-tools before 2.12.5, the tarball parser allows a buffer overflow and crash.\n## Remediation\nUpgrade `Alpine:3.12` `apk-tools` to version 2.10.6-r0 or higher.\n## References\n- [MISC](https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741)\n- [MISC](https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606)\n", "disclosureTime": "2021-04-21T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.37847", "probability": "0.00091" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1" ], "id": "SNYK-ALPINE312-APKTOOLS-1246338", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-30139" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T14:22:12.399050Z", "name": "apk-tools/apk-tools", "nearestFixedInVersion": "2.10.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "apk-tools", "patches": [], "publicationTime": "2021-04-15T03:45:07.947271Z", "references": [ { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741" }, { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<2.10.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "apk-tools/apk-tools@2.10.6-r0" ], "version": "2.10.5-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-07-27T14:06:41.093570Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-01-03T16:44:39.243547Z", "severity": "critical" } ], "cvssScore": 9.1, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `apk-tools` package and not the `apk-tools` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nlibfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the '\\0' terminator one byte too late.\n## Remediation\nUpgrade `Alpine:3.12` `apk-tools` to version 2.10.7-r0 or higher.\n## References\n- [MISC](https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch)\n- [MISC](https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749)\n- [MLIST](https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E)\n", "disclosureTime": "2021-08-03T14:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.48882", "probability": "0.00142" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1" ], "id": "SNYK-ALPINE312-APKTOOLS-1533753", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-36159" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T14:21:26.261460Z", "name": "apk-tools/apk-tools", "nearestFixedInVersion": "2.10.7-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "apk-tools", "patches": [], "publicationTime": "2021-07-27T14:06:38.323743Z", "references": [ { "title": "MISC", "url": "https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch" }, { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<2.10.7-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "apk-tools/apk-tools@2.10.7-r0" ], "version": "2.10.5-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [ false, "busybox/busybox@1.31.1-r20" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [ false, "busybox/busybox@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r20" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/gmp@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/libgmpxx@6.2.0-r0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/gmp-dev@6.2.0-r0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/libgmpxx@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/libgmpxx", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/libgmpxx@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/gmp-dev@6.2.0-r0", "gmp/libgmpxx@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/libgmpxx", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/gmp-dev@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp-dev", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/gmp-dev@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ncurses/ncurses-terminfo-base@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-terminfo-base", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "ncurses/ncurses-terminfo-base@6.2_p20200523-r1" ], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ncurses/ncurses-libs@6.2_p20200523-r0", "ncurses/ncurses-terminfo-base@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-terminfo-base", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "ncurses/ncurses-libs@6.2_p20200523-r1" ], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "procps/procps@3.3.16-r0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "readline/readline@8.0.4-r0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-01-08T03:45:00.784104Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T17:35:25.715360Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-04-07T01:11:05.197184Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-06-25T12:12:56.524936Z", "severity": "high" } ], "cvssScore": 8.1, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210212-0003/)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4826)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/988103)\n- [MISC](https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-01-06T21:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.70263", "probability": "0.00410" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8265" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-06-25T12:12:56.524936Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.790327Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4826" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/988103" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-01-08T03:45:00.898300Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:00:10.673760Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:53:14.116637Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-11T01:11:04.683193Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEJBY3RJB3XWUOJFGZM5E3EMQ7MFM3UT/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXLJY4764LYVJPC7NCDLE2UMQ3QC5OI2/)\n- [GENTOO](https://security.gentoo.org/glsa/202012-11)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/1033107)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-11-19T01:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74397", "probability": "0.00554" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056732", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8277" ], "CWE": [ "CWE-400" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:49:07.442606Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.902770Z", "references": [ { "title": "CONFIRM", "url": "https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEJBY3RJB3XWUOJFGZM5E3EMQ7MFM3UT/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXLJY4764LYVJPC7NCDLE2UMQ3QC5OI2/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-11" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/1033107" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Resource Exhaustion", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-24T03:45:04.485794Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:33:07.801355Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T17:37:27.207737Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T01:10:32.573925Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.21.0-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210416-0001/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/)\n- [MISC](https://hackerone.com/reports/1043360)\n- [MISC](https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-03-03T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66049", "probability": "0.00315" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1078726", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22883" ], "CWE": [ "CWE-400" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:46:31.635305Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.21.0-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-02-24T03:45:04.496405Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1043360" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.21.0-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Resource Exhaustion", "upgradePath": [ false, "nodejs/nodejs@12.21.0-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-02-24T03:45:04.566620Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T17:37:24.368344Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "modificationTime": "2022-05-03T22:33:20.414275Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-04-07T01:11:06.839918Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.21.0-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210416-0001/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210723-0001/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/)\n- [MISC](https://hackerone.com/reports/1069487)\n- [MISC](https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/)\n- [MISC](https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-03-03T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.59368", "probability": "0.00222" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1078727", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22884" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:46:31.359745Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.21.0-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-02-24T03:45:04.572981Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1069487" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/%23node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.21.0-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2021-22884", "upgradePath": [ false, "nodejs/nodejs@12.21.0-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-07-30T05:14:52.448150Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-04T01:11:14.996041Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 9.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-08-20T11:02:24.706790Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T21:07:21.935348Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.4-r0 or higher.\n## References\n- [MISC](https://hackerone.com/reports/1238162)\n- [MISC](https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20211112-0002/)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2021-10-07T14:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.48923", "probability": "0.00142" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1535111", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22930" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:49:11.427812Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.4-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-07-30T05:14:37.952619Z", "references": [ { "title": "MISC", "url": "https://hackerone.com/reports/1238162" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20211112-0002/" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.4-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "nodejs/nodejs@12.22.4-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-02T17:49:07.947461Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-15T01:10:30.866399Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-09-01T17:35:19.289005Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-05-03T21:55:35.206553Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.1-r0 or higher.\n## References\n- [MISC](https://github.com/yargs/y18n/issues/96)\n- [MISC](https://github.com/yargs/y18n/pull/108)\n- [MISC](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306)\n- [MISC](https://snyk.io/vuln/SNYK-JS-Y18N-1021887)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [report@snyk.io](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2020-11-17T13:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.96810", "probability": "0.42445" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1535426", "identifiers": { "ALTERNATIVE": [ "SNYK-ALPINE312-NODEJS-1244058" ], "CVE": [ "CVE-2020-7774" ], "CWE": [ "CWE-20" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:48:35.611704Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.1-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-02T17:48:55.135195Z", "references": [ { "title": "MISC", "url": "https://github.com/yargs/y18n/issues/96" }, { "title": "MISC", "url": "https://github.com/yargs/y18n/pull/108" }, { "title": "MISC", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306" }, { "title": "MISC", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "report@snyk.io", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.1-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Improper Input Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-27T02:21:26.603675Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:46:32.415735Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-13T01:11:13.423704Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:07:15.940491Z", "severity": "medium" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.5-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210923-0001/)\n- [MISC](https://hackerone.com/reports/1178337)\n- [MISC](https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-08-16T19:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.80869", "probability": "0.00938" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1570154", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22931" ], "CWE": [ "CWE-20" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:41:44.818762Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.5-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-27T02:21:26.588823Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210923-0001/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1178337" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.5-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Improper Input Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.5-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:52:45.120618Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:35.689720Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:39.668619Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-13T21:08:20.388255Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://www.debian.org/security/2021/dsa-5008)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [security-advisories@github.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.43105", "probability": "0.00110" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579558", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37701" ], "CWE": [ "CWE-22", "CWE-59" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:16.704913Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:45.085295Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:56:42.755244Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-01T22:08:18.435850Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:58.758987Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.8, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-26T01:11:09.743428Z", "severity": "high" } ], "cvssScore": 7.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\n`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2)\n- [MISC](https://www.npmjs.com/package/@npmcli/arborist)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.21051", "probability": "0.00056" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579564", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39135" ], "CWE": [ "CWE-61" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:45.318296Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:58.417145Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2" }, { "title": "MISC", "url": "https://www.npmjs.com/package/@npmcli/arborist" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Symlink Following", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:56:44.201376Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-01T22:08:17.754315Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:56.263465Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.8, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-13T01:11:12.420921Z", "severity": "high" } ], "cvssScore": 7.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\n`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc)\n- [MISC](https://www.npmjs.com/package/@npmcli/arborist)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.21051", "probability": "0.00056" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579565", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39134" ], "CWE": [ "CWE-61" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:43.551881Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:45.930629Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc" }, { "title": "MISC", "url": "https://www.npmjs.com/package/@npmcli/arborist" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Symlink Following", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:57:36.110283Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:18:12.740276Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:36.631320Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.23142", "probability": "0.00059" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579568", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37713" ], "CWE": [ "CWE-22" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:14.550265Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:47.673713Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:57:37.106435Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:35.782070Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:18:09.683772Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-13T18:47:58.237883Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://www.debian.org/security/2021/dsa-5008)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [security-advisories@github.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.43105", "probability": "0.00110" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579570", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37712" ], "CWE": [ "CWE-22", "CWE-59" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-23T13:10:08.866305Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:56:45.097974Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "cpes": [], "creationTime": "2022-02-08T04:09:17.766649Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-10T13:11:44.806068Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 4, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "modificationTime": "2022-05-18T11:06:41.716474Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-27T15:54:40.753215Z", "severity": "high" } ], "cvssScore": 8.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nDue to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1431042)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2022-02-24T19:15:10.080000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69401", "probability": "0.00386" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395503", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-21824" ], "CWE": [ "CWE-1321" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:37:46.710514Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:11:19.546760Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1431042" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2022-02-08T04:09:49.776451Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "modificationTime": "2022-05-03T21:08:20.444849Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-11-27T15:37:45.416905Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-10-06T01:10:21.886995Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAccepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1429694)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2022-02-24T19:15:09.313000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54091", "probability": "0.00181" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395506", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-44531" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:38:08.686069Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:08:20.926477Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1429694" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1n-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libssl1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "openssl/libssl1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "openssl/libssl1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [ false, "openssl/libssl1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [ false, "openssl/libssl1.1@1.1.1n-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib@1.2.12-r0" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib@1.2.12-r2" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib-dev@1.2.11-r3", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib-dev@1.2.11-r3", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib-dev@1.2.12-r0" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib-dev@1.2.12-r2" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" } ] }, "created_at": 1694690177.0005388, "has_audit_package": true } }, "repo_url": "https://github.com/cyber-dojo/shas", "template": [ "artifact", "branch-coverage", "snyk-scan" ], "last_modified_at": 1694690177.0005388, "state": "NON-COMPLIANT", "html_url": "https://app.kosli.com/cyber-dojo/flows/shas-archived-at-1705491385/artifacts/e848375868ed49d39e9cd07dc852c319839d80762e800b67d5efa8e6656b0a01", "api_url": "https://app.kosli.com/api/v2/artifacts/cyber-dojo/shas-archived-at-1705491385/fingerprint/e848375868ed49d39e9cd07dc852c319839d80762e800b67d5efa8e6656b0a01" }
Artifact Information |
|
Name | cyberdojo/shas:31c9f69 |
Fingerprint | e848375868ed49d39e9cd07dc852c319839d80762e800b67d5efa8e6656b0a01 |
Git commit | 31c9f69 |
CI Build | https://github.com/cyber-dojo/shas/actions/runs/6184645153 |
Running | - |
Exited | - |
Last modified | 1694690177.0005388 • 8 months ago |
Approvals
None |
Evidence
Evidence for 'branch-coverage'
{ "evidence_type": "generic", "name": "branch-coverage", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/shas/actions/runs/6184645153", "description": "server & client branch-coverage reports", "user_data": { "client": { "command_name": "Minitest", "groups": { "app": { "branches": { "covered": 1, "missed": 1, "total": 2 }, "lines": { "covered": 52, "missed": 0, "total": 52 } }, "test": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 0, "missed": 0, "total": 0 } } }, "timestamp": 1694690151 }, "server": { "command_name": "Minitest", "groups": { "app": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 69, "missed": 0, "total": 69 } }, "test": { "branches": { "covered": 0, "missed": 0, "total": 0 }, "lines": { "covered": 0, "missed": 0, "total": 0 } } }, "timestamp": 1694690141 } }, "created_at": 1694690164.1323044, "has_audit_package": false }
Evidence for 'snyk-scan'
{ "evidence_type": "snyk", "name": "snyk-scan", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/shas/actions/runs/6184645153", "evidence_archive_fingerprint": "d8393a929930d5d2848e1031a9a1875d0e238cbe26473f63abb20104b63c35d6", "user_data": {}, "snyk_results": { "dependencyCount": 45, "docker": { "baseImage": "ruby:2-alpine", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Your base image is out of date" }, { "message": "1) Pull the latest version of your base image by running 'docker pull ruby:2-alpine'" }, { "message": "2) Rebuild your local image" }, { "bold": true, "color": "yellow", "message": "Alpine 3.12.1 is no longer supported by the Alpine maintainers. Vulnerability detection may be affected by a lack of security updates." } ], "baseImageOutdated": true, "code": "OUTDATED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": false, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "jonjagger", "packageManager": "apk", "path": "cyberdojo/shas:31c9f69/shas", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/shas", "severityThreshold": "high", "summary": "157 high or critical severity vulnerable dependency paths", "uniqueCount": 36, "vulnerabilities": [ { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-04-15T03:45:07.931682Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-01-03T16:38:38.769177Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `apk-tools` package and not the `apk-tools` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn Alpine Linux apk-tools before 2.12.5, the tarball parser allows a buffer overflow and crash.\n## Remediation\nUpgrade `Alpine:3.12` `apk-tools` to version 2.10.6-r0 or higher.\n## References\n- [MISC](https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741)\n- [MISC](https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606)\n", "disclosureTime": "2021-04-21T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.37847", "probability": "0.00091" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1" ], "id": "SNYK-ALPINE312-APKTOOLS-1246338", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-30139" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T14:22:12.399050Z", "name": "apk-tools/apk-tools", "nearestFixedInVersion": "2.10.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "apk-tools", "patches": [], "publicationTime": "2021-04-15T03:45:07.947271Z", "references": [ { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10741" }, { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/12606" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<2.10.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "apk-tools/apk-tools@2.10.6-r0" ], "version": "2.10.5-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-07-27T14:06:41.093570Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-01-03T16:44:39.243547Z", "severity": "critical" } ], "cvssScore": 9.1, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `apk-tools` package and not the `apk-tools` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nlibfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the '\\0' terminator one byte too late.\n## Remediation\nUpgrade `Alpine:3.12` `apk-tools` to version 2.10.7-r0 or higher.\n## References\n- [MISC](https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch)\n- [MISC](https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749)\n- [MLIST](https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E)\n", "disclosureTime": "2021-08-03T14:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.48882", "probability": "0.00142" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1" ], "id": "SNYK-ALPINE312-APKTOOLS-1533753", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-36159" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-09-12T14:21:26.261460Z", "name": "apk-tools/apk-tools", "nearestFixedInVersion": "2.10.7-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "apk-tools", "patches": [], "publicationTime": "2021-07-27T14:06:38.323743Z", "references": [ { "title": "MISC", "url": "https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch" }, { "title": "MISC", "url": "https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<2.10.7-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "apk-tools/apk-tools@2.10.7-r0" ], "version": "2.10.5-r1" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [ false, "busybox/busybox@1.31.1-r20" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/busybox@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [ false, "busybox/busybox@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "alpine-baselayout/alpine-baselayout@3.2.0-r7", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "bash/bash@5.0.17-r0", "busybox/busybox@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/busybox", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-03-31T03:45:09.434484Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T21:09:25.885528Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-17T11:10:32.040972Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-21T01:10:53.389516Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\ndecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r20 or higher.\n## References\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/)\n- [GENTOO](https://security.gentoo.org/glsa/202105-09)\n- [MISC](https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html)\n", "disclosureTime": "2021-03-19T05:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.72088", "probability": "0.00468" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1089799", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-28831" ], "CWE": [ "CWE-755" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2022-11-17T11:10:32.040972Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r20", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-03-31T03:45:09.443687Z", "references": [ { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UDQGJRECXFS5EZVDH2OI45FMO436AC4/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7ZIFKPRR32ZYA3WAA2NXFA3QHHOU6FJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZASBW7QRRLY5V2R44MQ4QQM4CZIDHM2U/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-09" }, { "title": "MISC", "url": "https://git.busybox.net/busybox/commit/?id=f25d254dfd4243698c31a4f3153d4ac72aa9e9bd" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00001.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r20" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Handling of Exceptional Conditions", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r20" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:52:58.916293Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.705177Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:09:47.738707Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:00.843680Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.913000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920710", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42381" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.497300Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:52:58.898238Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:02.462024Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.926977Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.187004Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:05.173932Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.807000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920711", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42379" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.722324Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:02.430956Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:53:05.477938Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:16.740027Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:16.158427Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.114477Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.857000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920712", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42380" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.413701Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:05.463526Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:55:58.164395Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:16.497495Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.615356Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:42.750358Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.070000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920729", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42384" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.581814Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:37.525613Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.195427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:08:58.188675Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.544454Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:25:51.653709Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.123000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.45778", "probability": "0.00124" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920730", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42385" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.454604Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:28.310365Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:01.340753Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:11:11.025205Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.647705Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:26:38.783275Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.753000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42378" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:10.898154Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:56:01.325166Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:56:09.702875Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:17.500992Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:12:13.991782Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:22:52.824532Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.173000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920739", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42386" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.538512Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:54:40.152384Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:51.860733Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:32.726315Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.740336Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:24:03.382563Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:07.963000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920754", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42382" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.624699Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:10.195605Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-11-12T15:57:55.073311Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T11:10:57.454848Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-01-05T04:10:18.705852Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.6, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T20:23:51.012468Z", "severity": "medium" } ], "cvssScore": 7.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r21 or higher.\n## References\n- [reefs@jfrog.com](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)\n- [reefs@jfrog.com](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)\n- [reefs@jfrog.com](https://security.netapp.com/advisory/ntap-20211223-0002/)\n- [reefs@jfrog.com](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog)\n", "disclosureTime": "2021-11-15T21:15:08.017000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.46302", "probability": "0.00127" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-1920758", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-42383" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-26T01:10:11.667373Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r21", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2021-11-12T15:53:11.928545Z", "references": [ { "title": "reefs@jfrog.com", "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/" }, { "title": "reefs@jfrog.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/" }, { "title": "reefs@jfrog.com", "url": "https://security.netapp.com/advisory/ntap-20211223-0002/" }, { "title": "reefs@jfrog.com", "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r21" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r21" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-04-04T14:17:46.218308Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-12T01:11:07.664880Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "modificationTime": "2022-11-27T20:33:21.471365Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `busybox` package and not the `busybox` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nBusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.\n## Remediation\nUpgrade `Alpine:3.12` `busybox` to version 1.31.1-r22 or higher.\n## References\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch)\n- [cve@mitre.org](https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661)\n- [cve@mitre.org](https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch)\n", "disclosureTime": "2022-04-03T21:15:08.207000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74972", "probability": "0.00577" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "busybox/ssl_client@1.31.1-r19" ], "id": "SNYK-ALPINE312-BUSYBOX-2440610", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-28391" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:39:48.892642Z", "name": "busybox/ssl_client", "nearestFixedInVersion": "1.31.1-r22", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "busybox", "patches": [], "publicationTime": "2022-04-04T14:17:11.468554Z", "references": [ { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch" }, { "title": "cve@mitre.org", "url": "https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661" }, { "title": "cve@mitre.org", "url": "https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.31.1-r22" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2022-28391", "upgradePath": [ false, "busybox/ssl_client@1.31.1-r22" ], "version": "1.31.1-r19" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/gmp@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/libgmpxx@6.2.0-r0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/gmp-dev@6.2.0-r0", "gmp/gmp@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/libgmpxx@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/libgmpxx", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/libgmpxx@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/gmp-dev@6.2.0-r0", "gmp/libgmpxx@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/libgmpxx", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-01-28T03:20:34.437164Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T16:22:51.411440Z", "severity": "medium" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:17:09.671850Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-15T01:10:24.883733Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `gmp` package and not the `gmp` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.\n## Remediation\nUpgrade `Alpine:3.12` `gmp` to version 6.2.1-r1 or higher.\n## References\n- [cve@mitre.org](https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html)\n- [cve@mitre.org](https://bugs.debian.org/994405)\n- [cve@mitre.org](https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/10/13/3)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/8)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20221111-0001/)\n", "disclosureTime": "2021-11-15T04:15:06.873000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69898", "probability": "0.00399" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "gmp/gmp-dev@6.2.0-r0" ], "id": "SNYK-ALPINE312-GMP-2386787", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-43618" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:31:35.321231Z", "name": "gmp/gmp-dev", "nearestFixedInVersion": "6.2.1-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "gmp", "patches": [], "publicationTime": "2022-01-28T03:20:34.413036Z", "references": [ { "title": "cve@mitre.org", "url": "https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html" }, { "title": "cve@mitre.org", "url": "https://bugs.debian.org/994405" }, { "title": "cve@mitre.org", "url": "https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/10/13/3" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/8" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20221111-0001/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2.1-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "gmp/gmp-dev@6.2.1-r1" ], "version": "6.2.0-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ncurses/ncurses-terminfo-base@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-terminfo-base", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "ncurses/ncurses-terminfo-base@6.2_p20200523-r1" ], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ncurses/ncurses-libs@6.2_p20200523-r0", "ncurses/ncurses-terminfo-base@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-terminfo-base", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "ncurses/ncurses-libs@6.2_p20200523-r1" ], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "procps/procps@3.3.16-r0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-12-08T15:45:53.391726Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T21:35:10.215916Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-31T13:10:50.801671Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5.5, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T23:46:33.458500Z", "severity": "medium" } ], "cvssScore": 8.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `ncurses` package and not the `ncurses` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAn issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.\n## Remediation\nUpgrade `Alpine:3.12` `ncurses` to version 6.2_p20200523-r1 or higher.\n## References\n- [MISC](http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html)\n- [MISC](https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213443)\n- [cve@mitre.org](https://support.apple.com/kb/HT213444)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/28)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/43)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/45)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0012/)\n", "disclosureTime": "2021-09-20T16:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.79875", "probability": "0.00851" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "readline/readline@8.0.4-r0", "ncurses/ncurses-libs@6.2_p20200523-r0" ], "id": "SNYK-ALPINE312-NCURSES-2313024", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39537" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-04-28T01:10:04.872962Z", "name": "ncurses/ncurses-libs", "nearestFixedInVersion": "6.2_p20200523-r1", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "ncurses", "patches": [], "publicationTime": "2021-12-08T15:43:50.797542Z", "references": [ { "title": "MISC", "url": "http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html" }, { "title": "MISC", "url": "https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213443" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213444" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/28" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/43" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/45" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0012/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<6.2_p20200523-r1" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "6.2_p20200523-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-01-08T03:45:00.784104Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T17:35:25.715360Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-04-07T01:11:05.197184Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2023-06-25T12:12:56.524936Z", "severity": "high" } ], "cvssScore": 8.1, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210212-0003/)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4826)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/988103)\n- [MISC](https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-01-06T21:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.70263", "probability": "0.00410" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056731", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8265" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-06-25T12:12:56.524936Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.790327Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210212-0003/" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4826" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/988103" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-01-08T03:45:00.898300Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T22:00:10.673760Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:53:14.116637Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-11T01:11:04.683193Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nA Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.20.1-r0 or higher.\n## References\n- [CONFIRM](https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEJBY3RJB3XWUOJFGZM5E3EMQ7MFM3UT/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXLJY4764LYVJPC7NCDLE2UMQ3QC5OI2/)\n- [GENTOO](https://security.gentoo.org/glsa/202012-11)\n- [GENTOO](https://security.gentoo.org/glsa/202101-07)\n- [MISC](https://hackerone.com/reports/1033107)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpujan2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2020-11-19T01:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.74397", "probability": "0.00554" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1056732", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2020-8277" ], "CWE": [ "CWE-400" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:49:07.442606Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.20.1-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-01-08T03:45:00.902770Z", "references": [ { "title": "CONFIRM", "url": "https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEJBY3RJB3XWUOJFGZM5E3EMQ7MFM3UT/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXLJY4764LYVJPC7NCDLE2UMQ3QC5OI2/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-11" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "title": "MISC", "url": "https://hackerone.com/reports/1033107" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.20.1-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Resource Exhaustion", "upgradePath": [ false, "nodejs/nodejs@12.20.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-24T03:45:04.485794Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-05-03T22:33:07.801355Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-09-01T17:37:27.207737Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-25T01:10:32.573925Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.21.0-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210416-0001/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/)\n- [MISC](https://hackerone.com/reports/1043360)\n- [MISC](https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-03-03T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66049", "probability": "0.00315" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1078726", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22883" ], "CWE": [ "CWE-400" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:46:31.635305Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.21.0-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-02-24T03:45:04.496405Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1043360" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.21.0-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Resource Exhaustion", "upgradePath": [ false, "nodejs/nodejs@12.21.0-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-02-24T03:45:04.566620Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T17:37:24.368344Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "modificationTime": "2022-05-03T22:33:20.414275Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-04-07T01:11:06.839918Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.21.0-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210416-0001/)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210723-0001/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/)\n- [MISC](https://hackerone.com/reports/1069487)\n- [MISC](https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/)\n- [MISC](https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-03-03T18:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.59368", "probability": "0.00222" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1078727", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22884" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:46:31.359745Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.21.0-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-02-24T03:45:04.572981Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1069487" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/%23node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.21.0-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "CVE-2021-22884", "upgradePath": [ false, "nodejs/nodejs@12.21.0-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-07-30T05:14:52.448150Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-04T01:11:14.996041Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 9.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-08-20T11:02:24.706790Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-27T21:07:21.935348Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.4-r0 or higher.\n## References\n- [MISC](https://hackerone.com/reports/1238162)\n- [MISC](https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20211112-0002/)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2021-10-07T14:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.48923", "probability": "0.00142" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1535111", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22930" ], "CWE": [ "CWE-416" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:49:11.427812Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.4-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-07-30T05:14:37.952619Z", "references": [ { "title": "MISC", "url": "https://hackerone.com/reports/1238162" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases-2/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20211112-0002/" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.4-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Use After Free", "upgradePath": [ false, "nodejs/nodejs@12.22.4-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-02T17:49:07.947461Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-15T01:10:30.866399Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-09-01T17:35:19.289005Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 7.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "modificationTime": "2022-05-03T21:55:35.206553Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.1-r0 or higher.\n## References\n- [MISC](https://github.com/yargs/y18n/issues/96)\n- [MISC](https://github.com/yargs/y18n/pull/108)\n- [MISC](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306)\n- [MISC](https://snyk.io/vuln/SNYK-JS-Y18N-1021887)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [report@snyk.io](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2020-11-17T13:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.96810", "probability": "0.42445" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1535426", "identifiers": { "ALTERNATIVE": [ "SNYK-ALPINE312-NODEJS-1244058" ], "CVE": [ "CVE-2020-7774" ], "CWE": [ "CWE-20" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:48:35.611704Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.1-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-02T17:48:55.135195Z", "references": [ { "title": "MISC", "url": "https://github.com/yargs/y18n/issues/96" }, { "title": "MISC", "url": "https://github.com/yargs/y18n/pull/108" }, { "title": "MISC", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306" }, { "title": "MISC", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "report@snyk.io", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.1-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Improper Input Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.1-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-27T02:21:26.603675Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:46:32.415735Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-13T01:11:13.423704Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "modificationTime": "2022-11-27T21:07:15.940491Z", "severity": "medium" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nNode.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.5-r0 or higher.\n## References\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210923-0001/)\n- [MISC](https://hackerone.com/reports/1178337)\n- [MISC](https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [support@hackerone.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-08-16T19:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.80869", "probability": "0.00938" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1570154", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-22931" ], "CWE": [ "CWE-20" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:41:44.818762Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.5-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-08-27T02:21:26.588823Z", "references": [ { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210923-0001/" }, { "title": "MISC", "url": "https://hackerone.com/reports/1178337" }, { "title": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "support@hackerone.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.5-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Improper Input Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.5-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:52:45.120618Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:35.689720Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:39.668619Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-13T21:08:20.388255Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://www.debian.org/security/2021/dsa-5008)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [security-advisories@github.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.43105", "probability": "0.00110" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579558", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37701" ], "CWE": [ "CWE-22", "CWE-59" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:16.704913Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:45.085295Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:56:42.755244Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-01T22:08:18.435850Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:58.758987Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.8, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-26T01:11:09.743428Z", "severity": "high" } ], "cvssScore": 7.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\n`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2)\n- [MISC](https://www.npmjs.com/package/@npmcli/arborist)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.21051", "probability": "0.00056" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579564", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39135" ], "CWE": [ "CWE-61" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:45.318296Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:58.417145Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2" }, { "title": "MISC", "url": "https://www.npmjs.com/package/@npmcli/arborist" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Symlink Following", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:56:44.201376Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-01T22:08:17.754315Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:17:56.263465Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.8, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "modificationTime": "2022-08-13T01:11:12.420921Z", "severity": "high" } ], "cvssScore": 7.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\n`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc)\n- [MISC](https://www.npmjs.com/package/@npmcli/arborist)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.21051", "probability": "0.00056" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579565", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-39134" ], "CWE": [ "CWE-61" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:43.551881Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:45.930629Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc" }, { "title": "MISC", "url": "https://www.npmjs.com/package/@npmcli/arborist" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Symlink Following", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:57:36.110283Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:18:12.740276Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:36.631320Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.23142", "probability": "0.00059" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579568", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37713" ], "CWE": [ "CWE-22" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:47:14.550265Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:52:47.673713Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-09-01T17:57:37.106435Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.6, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "modificationTime": "2022-04-26T01:10:35.782070Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-05-03T21:18:09.683772Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "modificationTime": "2022-09-13T18:47:58.237883Z", "severity": "high" } ], "cvssScore": 8.6, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.6-r0 or higher.\n## References\n- [CONFIRM](https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p)\n- [MISC](https://www.npmjs.com/package/tar)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [security-advisories@github.com](https://www.debian.org/security/2021/dsa-5008)\n- [security-advisories@github.com](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [security-advisories@github.com](https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html)\n", "disclosureTime": "2021-08-31T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.43105", "probability": "0.00110" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-1579570", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-37712" ], "CWE": [ "CWE-22", "CWE-59" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-23T13:10:08.866305Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.6-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2021-09-01T17:56:45.097974Z", "references": [ { "title": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" }, { "title": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "security-advisories@github.com", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "title": "security-advisories@github.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "security-advisories@github.com", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.6-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Directory Traversal", "upgradePath": [ false, "nodejs/nodejs@12.22.6-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "cpes": [], "creationTime": "2022-02-08T04:09:17.766649Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-10T13:11:44.806068Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 4, "cvssV3Vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "modificationTime": "2022-05-18T11:06:41.716474Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-27T15:54:40.753215Z", "severity": "high" } ], "cvssScore": 8.2, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nDue to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1431042)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [support@hackerone.com](https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html)\n", "disclosureTime": "2022-02-24T19:15:10.080000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69401", "probability": "0.00386" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395503", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-21824" ], "CWE": [ "CWE-1321" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:37:46.710514Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:11:19.546760Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1431042" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "support@hackerone.com", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2022-02-08T04:09:49.776451Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "modificationTime": "2022-05-03T21:08:20.444849Z", "severity": "medium" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-11-27T15:37:45.416905Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-10-06T01:10:21.886995Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `nodejs` package and not the `nodejs` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nAccepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.\n## Remediation\nUpgrade `Alpine:3.12` `nodejs` to version 12.22.10-r0 or higher.\n## References\n- [support@hackerone.com](https://hackerone.com/reports/1429694)\n- [support@hackerone.com](https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/)\n- [support@hackerone.com](https://security.netapp.com/advisory/ntap-20220325-0007/)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [support@hackerone.com](https://www.debian.org/security/2022/dsa-5170)\n- [support@hackerone.com](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2022-02-24T19:15:09.313000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54091", "probability": "0.00181" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0" ], "id": "SNYK-ALPINE312-NODEJS-2395506", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-44531" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:38:08.686069Z", "name": "nodejs/nodejs", "nearestFixedInVersion": "12.22.10-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "nodejs", "patches": [], "publicationTime": "2022-01-12T03:08:20.926477Z", "references": [ { "title": "support@hackerone.com", "url": "https://hackerone.com/reports/1429694" }, { "title": "support@hackerone.com", "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "title": "support@hackerone.com", "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "support@hackerone.com", "url": "https://www.debian.org/security/2022/dsa-5170" }, { "title": "support@hackerone.com", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<12.22.10-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "nodejs/nodejs@12.22.10-r0" ], "version": "12.18.4-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [ false, "openssl/libcrypto1.1@1.1.1n-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "ca-certificates/ca-certificates@20191127-r4", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libcrypto1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libcrypto1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [ false, "openssl/libssl1.1@1.1.1j-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [ false, "openssl/libssl1.1@1.1.1k-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [ false, "openssl/libssl1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [ false, "openssl/libssl1.1@1.1.1l-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [ false, "openssl/libssl1.1@1.1.1n-r0" ], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "libtls-standalone/libtls-standalone@2.9.1-r1", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2021-02-17T15:45:08.551256Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 6.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-05-03T22:33:33.433434Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-08-30T01:10:59.844335Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-10-26T23:52:28.879159Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nCalls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1j-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210219-0009/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210216.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-03)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-10)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4855)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n", "disclosureTime": "2021-02-16T17:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.66158", "probability": "0.00316" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1075735", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-23840" ], "CWE": [ "CWE-190" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:42:11.594647Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1j-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-02-17T15:45:08.420994Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-03" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-10" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4855" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1j-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Integer Overflow or Wraparound", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "cpes": [], "creationTime": "2021-03-26T03:45:13.313842Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-05-03T21:58:01.222205Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-09-01T22:10:57.756043Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "modificationTime": "2022-07-26T01:11:34.576726Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1k-r0 or higher.\n## References\n- [CISCO](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b)\n- [CONFIRM](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845)\n- [CONFIRM](https://kc.mcafee.com/corporate/index?page=content&id=SB10356)\n- [CONFIRM](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210326-0006/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210325.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-05)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-08)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-09)\n- [FEDORA](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/)\n- [GENTOO](https://security.gentoo.org/glsa/202103-03)\n- [MISC](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html)\n- [MISC](https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc)\n- [MISC](https://www.oracle.com/security-alerts/cpuApr2021.html)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/1)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/27/2)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/3)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/03/28/4)\n- [N/A](https://www.oracle.com//security-alerts/cpujul2021.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n", "disclosureTime": "2021-03-25T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.56471", "probability": "0.00198" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1089238", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3450" ], "CWE": [ "CWE-295" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-03-01T01:10:08.689970Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1k-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-03-26T03:45:13.018982Z", "references": [ { "title": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "title": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "title": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "title": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-05" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-08" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-09" }, { "title": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "title": "GENTOO", "url": "https://security.gentoo.org/glsa/202103-03" }, { "title": "MISC", "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "title": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "title": "N/A", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1k-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Improper Certificate Validation", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cpes": [], "creationTime": "2021-08-25T05:14:28.732044Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-25T23:39:35.344116Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 5.3, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "modificationTime": "2022-05-03T21:47:28.652747Z", "severity": "medium" }, { "assigner": "NVD", "cvssV3BaseScore": 7.4, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "modificationTime": "2022-10-17T01:10:39.512050Z", "severity": "high" } ], "cvssScore": 7.4, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11)\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html)\n- [MLIST](https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://kc.mcafee.com/corporate/index?page=content&id=SB10366)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.69762", "probability": "0.00396" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569450", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3712" ], "CWE": [ "CWE-125" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:42.564556Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:36.281456Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "title": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Read", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2021-08-25T05:16:18.150026Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-05-03T21:47:21.225218Z", "severity": "critical" }, { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-17T01:10:39.121183Z", "severity": "critical" }, { "assigner": "Red Hat", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-10-27T00:55:54.590918Z", "severity": "critical" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nIn order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1l-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46)\n- [CONFIRM](https://security.netapp.com/advisory/ntap-20210827-0010/)\n- [CONFIRM](https://www.openssl.org/news/secadv/20210824.txt)\n- [CONFIRM](https://www.tenable.com/security/tns-2021-16)\n- [DEBIAN](https://www.debian.org/security/2021/dsa-4963)\n- [MISC](https://www.oracle.com/security-alerts/cpuoct2021.html)\n- [MLIST](https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E)\n- [MLIST](http://www.openwall.com/lists/oss-security/2021/08/26/2)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20211022-0003/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-02)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujan2022.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202209-02)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2021-08-24T15:15:00Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.91817", "probability": "0.05174" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-1569452", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2021-3711" ], "CWE": [ "CWE-120" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:43:33.164353Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1l-r0", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2021-08-25T05:11:05.591709Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "title": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "title": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "title": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "title": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "title": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "title": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-02" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202209-02" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1l-r0" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Buffer Overflow", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-16T02:30:28.633427Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "SUSE", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-06-01T11:06:13.508994Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-10T01:11:47.822021Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-27T21:32:10.336778Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).\n## Remediation\nUpgrade `Alpine:3.12` `openssl` to version 1.1.1n-r0 or higher.\n## References\n- [CONFIRM](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83)\n- [openssl-security@openssl.org](https://www.openssl.org/news/secadv/20220315.txt)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246)\n- [openssl-security@openssl.org](https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65)\n- [openssl-security@openssl.org](https://www.debian.org/security/2022/dsa-5103)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html)\n- [openssl-security@openssl.org](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220321-0002/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/)\n- [openssl-security@openssl.org](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-06)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-07)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/)\n- [openssl-security@openssl.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-08)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpuapr2022.html)\n- [openssl-security@openssl.org](https://www.tenable.com/security/tns-2022-09)\n- [openssl-security@openssl.org](https://security.netapp.com/advisory/ntap-20220429-0005/)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213256)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213255)\n- [openssl-security@openssl.org](https://support.apple.com/kb/HT213257)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [openssl-security@openssl.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [openssl-security@openssl.org](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html)\n- [openssl-security@openssl.org](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf)\n- [openssl-security@openssl.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [openssl-security@openssl.org](https://security.gentoo.org/glsa/202210-02)\n", "disclosureTime": "2022-03-15T17:15:08.513000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.86734", "probability": "0.01863" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "openssl/libssl1.1@1.1.1g-r0" ], "id": "SNYK-ALPINE312-OPENSSL-2426332", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-0778" ], "CWE": [ "CWE-835" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T13:33:32.863022Z", "name": "openssl/libssl1.1", "nearestFixedInVersion": "1.1.1n-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "openssl", "patches": [], "publicationTime": "2022-03-16T02:29:20.424819Z", "references": [ { "title": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "title": "openssl-security@openssl.org", "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "title": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "title": "openssl-security@openssl.org", "url": "https://www.debian.org/security/2022/dsa-5103" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "title": "openssl-security@openssl.org", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/" }, { "title": "openssl-security@openssl.org", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-06" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-07" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/" }, { "title": "openssl-security@openssl.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-08" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://www.tenable.com/security/tns-2022-09" }, { "title": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "openssl-security@openssl.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "openssl-security@openssl.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "openssl-security@openssl.org", "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "title": "openssl-security@openssl.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "title": "openssl-security@openssl.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202210-02" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.1.1n-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Loop with Unreachable Exit Condition ('Infinite Loop')", "upgradePath": [], "version": "1.1.1g-r0" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib@1.2.12-r0" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib@1.2.12-r2" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib-dev@1.2.11-r3", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib-dev@1.2.11-r3", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "apk-tools/apk-tools@2.10.5-r1", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "nodejs/nodejs@12.18.4-r0", "zlib/zlib@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib-dev@1.2.12-r0" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [ false, "zlib/zlib-dev@1.2.12-r2" ], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cpes": [], "creationTime": "2022-03-29T02:23:22.124181Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 8.2, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "modificationTime": "2022-11-16T14:29:48.428198Z", "severity": "high" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-10T11:01:23.770306Z", "severity": "high" }, { "assigner": "NVD", "cvssV3BaseScore": 7.5, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2022-11-22T01:10:52.367678Z", "severity": "high" } ], "cvssScore": 7.5, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r0 or higher.\n## References\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/24/1)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/25/2)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/03/26/1)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/1)\n- [cve@mitre.org](https://github.com/madler/zlib/compare/v1.2.11...v1.2.12)\n- [cve@mitre.org](https://www.openwall.com/lists/oss-security/2022/03/28/3)\n- [cve@mitre.org](https://github.com/madler/zlib/issues/605)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5111)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html)\n- [cve@mitre.org](https://support.apple.com/kb/HT213255)\n- [cve@mitre.org](https://support.apple.com/kb/HT213256)\n- [cve@mitre.org](https://support.apple.com/kb/HT213257)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/33)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/35)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/May/38)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220526-0009/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/)\n- [cve@mitre.org](https://www.oracle.com/security-alerts/cpujul2022.html)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220729-0004/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html)\n- [cve@mitre.org](https://security.gentoo.org/glsa/202210-42)\n- [cve@mitre.org](https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf)\n", "disclosureTime": "2022-03-25T09:15:08.187000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.54063", "probability": "0.00180" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2434421", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2018-25032" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-02-14T15:04:57.811608Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r0", "nvdSeverity": "high", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-03-29T02:21:52.176735Z", "references": [ { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "title": "cve@mitre.org", "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/issues/605" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213255" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213256" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213257" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "title": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "title": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202210-42" }, { "title": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r0" ] }, "severity": "high", "severityWithCritical": "high", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" }, { "CVSSv3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cpes": [], "creationTime": "2022-08-09T14:32:20.141035Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "NVD", "cvssV3BaseScore": 9.8, "cvssV3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-11-17T01:11:14.816208Z", "severity": "critical" }, { "assigner": "SUSE", "cvssV3BaseScore": 8.1, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "modificationTime": "2022-09-01T11:41:04.286968Z", "severity": "high" }, { "assigner": "Red Hat", "cvssV3BaseScore": 7, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "modificationTime": "2022-11-16T14:27:58.106275Z", "severity": "high" } ], "cvssScore": 9.8, "description": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `zlib` package and not the `zlib` package as distributed by `Alpine:3.12`._\n_See `How to fix?` for `Alpine:3.12` relevant fixed versions and status._\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n## Remediation\nUpgrade `Alpine:3.12` `zlib` to version 1.2.12-r2 or higher.\n## References\n- [cve@mitre.org](https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764)\n- [cve@mitre.org](https://github.com/ivd38/zlib_overflow)\n- [cve@mitre.org](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1)\n- [cve@mitre.org](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/05/2)\n- [cve@mitre.org](https://github.com/curl/curl/issues/9271)\n- [cve@mitre.org](http://www.openwall.com/lists/oss-security/2022/08/09/1)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://www.debian.org/security/2022/dsa-5218)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20220901-0005/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://support.apple.com/kb/HT213490)\n- [cve@mitre.org](https://support.apple.com/kb/HT213493)\n- [cve@mitre.org](https://support.apple.com/kb/HT213494)\n- [cve@mitre.org](https://support.apple.com/kb/HT213491)\n- [cve@mitre.org](https://support.apple.com/kb/HT213488)\n- [cve@mitre.org](https://support.apple.com/kb/HT213489)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/41)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/37)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/38)\n- [cve@mitre.org](http://seclists.org/fulldisclosure/2022/Oct/42)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/)\n- [cve@mitre.org](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/)\n- [cve@mitre.org](https://security.netapp.com/advisory/ntap-20230427-0007/)\n", "disclosureTime": "2022-08-05T07:15:07.240000Z", "epssDetails": { "modelVersion": "v2023.03.01", "percentile": "0.57947", "probability": "0.00209" }, "exploit": "Not Defined", "from": [ "docker-image|cyberdojo/shas@31c9f69", ".ruby-rundeps@20201022.054836", "zlib/zlib-dev@1.2.11-r3" ], "id": "SNYK-ALPINE312-ZLIB-2977082", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2022-37434" ], "CWE": [ "CWE-787" ] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2023-07-19T01:12:46.153227Z", "name": "zlib/zlib-dev", "nearestFixedInVersion": "1.2.12-r2", "nvdSeverity": "critical", "packageManager": "alpine:3.12", "packageName": "zlib", "patches": [], "publicationTime": "2022-08-06T14:21:13.389533Z", "references": [ { "title": "cve@mitre.org", "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c%23L762-L764" }, { "title": "cve@mitre.org", "url": "https://github.com/ivd38/zlib_overflow" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "title": "cve@mitre.org", "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h%23L1062-L1063" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "title": "cve@mitre.org", "url": "https://github.com/curl/curl/issues/9271" }, { "title": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://www.debian.org/security/2022/dsa-5218" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20220901-0005/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213490" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213493" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213494" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213491" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213488" }, { "title": "cve@mitre.org", "url": "https://support.apple.com/kb/HT213489" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/38" }, { "title": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2022/Oct/42" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/" }, { "title": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/" }, { "title": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" } ], "relativeImportance": null, "semver": { "vulnerable": [ "<1.2.12-r2" ] }, "severity": "critical", "severityWithCritical": "critical", "socialTrendAlert": false, "title": "Out-of-bounds Write", "upgradePath": [], "version": "1.2.11-r3" } ] }, "created_at": 1694690177.0005388, "has_audit_package": true }