Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cargo-edit-0.7.0.crate: 20 vulnerabilities (highest severity is: 9.8) #318

Open
mend-for-github-com bot opened this issue Sep 15, 2023 · 0 comments
Open

Comments

@mend-for-github-com
Copy link

Vulnerable Library - cargo-edit-0.7.0.crate

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (cargo-edit version) Remediation Possible**
CVE-2022-2274 Critical 9.8 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2021-3711 Critical 9.8 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
WS-2023-0195 Critical 9.1 openssl-0.10.32.crate Transitive N/A*
WS-2022-0049 High 8.1 thread_local-1.1.3.crate Transitive N/A*
CVE-2022-24713 High 7.5 regex-1.4.3.crate Transitive N/A*
WS-2023-0082 High 7.5 openssl-0.10.32.crate Transitive N/A*
CVE-2022-1473 High 7.5 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
WS-2023-0081 High 7.5 openssl-0.10.32.crate Transitive N/A*
CVE-2022-0778 High 7.5 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
WS-2023-0083 High 7.5 openssl-0.10.32.crate Transitive N/A*
CVE-2023-0215 High 7.5 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2021-4044 High 7.5 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2022-4450 High 7.5 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2021-3712 High 7.4 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2023-0286 High 7.4 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2022-4304 Medium 5.9 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2022-1434 Medium 5.9 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2022-1343 Medium 5.3 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2022-2097 Medium 5.3 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*
CVE-2022-4203 Medium 4.9 openssl-src-111.14.0+1.1.1j.crate Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2022-2274

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.

Publish Date: 2022-07-01

URL: CVE-2022-2274

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2274

Release Date: 2022-07-01

Fix Resolution: openssl-src - 300.0.9+3.0.5

CVE-2021-3711

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).

Publish Date: 2021-08-24

URL: CVE-2021-3711

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.openssl.org/news/secadv/20210824.txt

Release Date: 2021-08-24

Fix Resolution: OpenSSL_1_1_1l

WS-2023-0195

Vulnerable Library - openssl-0.10.32.crate

OpenSSL bindings

Library home page: https://crates.io/api/v1/crates/openssl/0.10.32/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

openssl X509VerifyParamRef::set_host buffer over-read

Publish Date: 2023-06-22

URL: WS-2023-0195

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-xcf7-rvmh-g6q4

Release Date: 2023-06-22

Fix Resolution: openssl - 0.10.55

WS-2022-0049

Vulnerable Library - thread_local-1.1.3.crate

Per-object thread-local storage

Library home page: https://crates.io/api/v1/crates/thread_local/1.1.3/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • regex-1.4.3.crate
      • thread_local-1.1.3.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

In the affected version of this crate, {Iter, IterMut}::next used a weaker memory ordering when loading values than what was required, exposing a potential data race when iterating over a ThreadLocal's values.

Crates using Iter::next, or IterMut::next are affected by this issue.

Publish Date: 2022-01-23

URL: WS-2022-0049

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://rustsec.org/advisories/RUSTSEC-2022-0006.html

Release Date: 2022-01-23

Fix Resolution: thread_local - 1.1.4

CVE-2022-24713

Vulnerable Library - regex-1.4.3.crate

An implementation of regular expressions for Rust. This implementation uses finite automata and guarantees linear time matching on all inputs.

Library home page: https://crates.io/api/v1/crates/regex/1.4.3/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • regex-1.4.3.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.

Publish Date: 2022-03-08

URL: CVE-2022-24713

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-m5pq-gvj9-9vr8

Release Date: 2022-03-08

Fix Resolution: regex - 1.5.5

WS-2023-0082

Vulnerable Library - openssl-0.10.32.crate

OpenSSL bindings

Library home page: https://crates.io/api/v1/crates/openssl/0.10.32/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

openssl X509NameBuilder::build returned object is not thread safe

Publish Date: 2023-03-25

URL: WS-2023-0082

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-3gxf-9r58-2ghg

Release Date: 2023-03-25

Fix Resolution: openssl - 0.10.48

CVE-2022-1473

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. The function was added in the OpenSSL 3.0 version thus older releases are not affected by the issue. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).

Publish Date: 2022-05-03

URL: CVE-2022-1473

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://rustsec.org/advisories/RUSTSEC-2022-0025.html

Release Date: 2022-05-03

Fix Resolution: openssl-src - 300.0.6+3.0.3

WS-2023-0081

Vulnerable Library - openssl-0.10.32.crate

OpenSSL bindings

Library home page: https://crates.io/api/v1/crates/openssl/0.10.32/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

openssl X509Extension::new and X509Extension::new_nid null pointer dereference

Publish Date: 2023-03-25

URL: WS-2023-0081

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-6hcf-g6gr-hhcr

Release Date: 2023-03-25

Fix Resolution: openssl - 0.10.48

CVE-2022-0778

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).

Publish Date: 2022-03-15

URL: CVE-2022-0778

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-jf66-3q76-h5p5

Release Date: 2022-03-15

Fix Resolution: OpenSSL_1_1_1n, openssl-3.0.2

WS-2023-0083

Vulnerable Library - openssl-0.10.32.crate

OpenSSL bindings

Library home page: https://crates.io/api/v1/crates/openssl/0.10.32/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

openssl SubjectAlternativeName and ExtendedKeyUsage::other allow arbitrary file read

Publish Date: 2023-03-25

URL: WS-2023-0083

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-9qwg-crg9-m2vc

Release Date: 2023-03-25

Fix Resolution: openssl - 0.10.48

CVE-2023-0215

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The public API function BIO_new_NDEF is a helper function used for streaming
ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the
SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by
end user applications.

The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter
BIO onto the front of it to form a BIO chain, and then returns the new head of
the BIO chain to the caller. Under certain conditions, for example if a CMS
recipient public key is invalid, the new filter BIO is freed and the function
returns a NULL result indicating a failure. However, in this case, the BIO chain
is not properly cleaned up and the BIO passed by the caller still retains
internal pointers to the previously freed filter BIO. If the caller then goes on
to call BIO_pop() on the BIO then a use-after-free will occur. This will most
likely result in a crash.

This scenario occurs directly in the internal function B64_write_ASN1() which
may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on
the BIO. This internal function is in turn called by the public API functions
PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream,
SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.

Other public API functions that may be impacted by this include
i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and
i2d_PKCS7_bio_stream.

The OpenSSL cms and smime command line applications are similarly affected.

Publish Date: 2023-02-08

URL: CVE-2023-0215

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-r7jw-wp68-3xch

Release Date: 2023-02-08

Fix Resolution: openssl-src - 111.25,300.0.12

CVE-2021-4044

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug in OpenSSL 3.0 that will cause X509_verify_cert() to indicate an internal error when processing a certificate chain. This will occur where a certificate does not include the Subject Alternative Name extension but where a Certificate Authority has enforced name constraints. This issue can occur even with valid chains. By combining the two issues an attacker could induce incorrect, application dependent behaviour. Fixed in OpenSSL 3.0.1 (Affected 3.0.0).

Publish Date: 2021-12-14

URL: CVE-2021-4044

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-mmjf-f5jw-w72q

Release Date: 2021-12-14

Fix Resolution: openssl-src - 300.0.4+3.0.1

CVE-2022-4450

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.

Publish Date: 2023-02-08

URL: CVE-2022-4450

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.openssl.org/news/vulnerabilities.html

Release Date: 2023-02-08

Fix Resolution: OpenSSL_1_1_1t,openssl-3.0.8

CVE-2021-3712

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).

Publish Date: 2021-08-24

URL: CVE-2021-3712

CVSS 3 Score Details (7.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.openssl.org/news/secadv/20210824.txt

Release Date: 2021-08-24

Fix Resolution: OpenSSL - 1.1.1l

CVE-2023-0286

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.

Publish Date: 2023-02-08

URL: CVE-2023-0286

CVSS 3 Score Details (7.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-x4qr-2fvf-3mr5

Release Date: 2023-02-08

Fix Resolution: OpenSSL_1_0_2a--OpenSSL_1_0_2u;OpenSSL_1_1_1a--OpenSSL_1_1_1s;cryptography - 39.0.1

CVE-2022-4304

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

Publish Date: 2023-02-08

URL: CVE-2022-4304

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.openssl.org/news/vulnerabilities.html

Release Date: 2023-02-08

Fix Resolution: OpenSSL_1_1_1t,openssl-3.0.8

CVE-2022-1434

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being sent from one endpoint to an OpenSSL 3.0 recipient such that the modified data would still pass the MAC integrity check. Note that data sent from an OpenSSL 3.0 endpoint to a non-OpenSSL 3.0 endpoint will always be rejected by the recipient and the connection will fail at that point. Many application protocols require data to be sent from the client to the server first. Therefore, in such a case, only an OpenSSL 3.0 server would be impacted when talking to a non-OpenSSL 3.0 client. If both endpoints are OpenSSL 3.0 then the attacker could modify data being sent in both directions. In this case both clients and servers could be affected, regardless of the application protocol. Note that in the absence of an attacker this bug means that an OpenSSL 3.0 endpoint communicating with a non-OpenSSL 3.0 endpoint will fail to complete the handshake when using this ciphersuite. The confidentiality of data is not impacted by this issue, i.e. an attacker cannot decrypt data that has been encrypted using this ciphersuite - they can only modify it. In order for this attack to work both endpoints must legitimately negotiate the RC4-MD5 ciphersuite. This ciphersuite is not compiled by default in OpenSSL 3.0, and is not available within the default provider or the default ciphersuite list. This ciphersuite will never be used if TLSv1.3 has been negotiated. In order for an OpenSSL 3.0 endpoint to use this ciphersuite the following must have occurred: 1) OpenSSL must have been compiled with the (non-default) compile time option enable-weak-ssl-ciphers 2) OpenSSL must have had the legacy provider explicitly loaded (either through application code or via configuration) 3) The ciphersuite must have been explicitly added to the ciphersuite list 4) The libssl security level must have been set to 0 (default is 1) 5) A version of SSL/TLS below TLSv1.3 must have been negotiated 6) Both endpoints must negotiate the RC4-MD5 ciphersuite in preference to any others that both endpoints have in common Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).

Publish Date: 2022-05-03

URL: CVE-2022-1434

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://rustsec.org/advisories/RUSTSEC-2022-0026.html

Release Date: 2022-05-03

Fix Resolution: openssl-src - 300.0.6+3.0.3

CVE-2022-1343

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The function OCSP_basic_verify verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of OCSP_basic_verify will not use the OCSP_NOCHECKS flag. In this case the OCSP_basic_verify function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).

Publish Date: 2022-05-03

URL: CVE-2022-1343

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://rustsec.org/advisories/RUSTSEC-2022-0027.html

Release Date: 2022-05-03

Fix Resolution: openssl-src - 300.0.6+3.0.3

CVE-2022-2097

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).

Publish Date: 2022-07-05

URL: CVE-2022-2097

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097

Release Date: 2022-07-05

Fix Resolution: OpenSSL_1_1_1q,openssl-3.0.5

CVE-2022-4203

Vulnerable Library - openssl-src-111.14.0+1.1.1j.crate

Source of OpenSSL and logic to build it.

Library home page: https://crates.io/api/v1/crates/openssl-src/111.14.0+1.1.1j/download

Dependency Hierarchy:

  • cargo-edit-0.7.0.crate (Root Library)
    • reqwest-0.10.10.crate
      • tokio-tls-0.3.1.crate
        • native-tls-0.2.7.crate
          • openssl-0.10.32.crate
            • openssl-sys-0.9.60.crate
              • openssl-src-111.14.0+1.1.1j.crate (Vulnerable Library)

Found in base branch: main

Vulnerability Details

A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. The read buffer overrun might result in a crash which could lead to a denial of service attack. In theory it could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext) although we are not aware of any working exploit leading to memory contents disclosure as of the time of release of this advisory. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

Publish Date: 2023-02-24

URL: CVE-2022-4203

CVSS 3 Score Details (4.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://rustsec.org/advisories/RUSTSEC-2023-0008.html

Release Date: 2022-11-29

Fix Resolution: openssl-3.0.8

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants