You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While this looks like a legitimate DoS vulnerability when w3m is used with untrusted HTML sites, it is not applicable here: the w3m dependency comes in via nixos-help:
So w3m is used to browse nixos-help here if no other browser is found. While in theory nixos-help may have outbound links that might not be trusted, or the user could use nixos-help to enter w3m and then visit random URLs, but that seems unlikely.
We might want to either:
Make sure this issue is reported with severity 'low' in this context
Suppress the advisory entirely in this context.
For the first solution: the issue carries two severity ratings: a Low rating based on https://access.redhat.com/security/updates/classification/ , and a MEDIUM CVSS score. These kinds of nuances are hard to encode into CVSS. We could:
choose to follow RedHat severity ratings over CVSS scores
'override' the severity level of CVE-2023-38253 to 'low' (in a Nix-specific text rating provided by the online tool) only in this context. This would require the online tool to provide updated severity ratings for CVEs taking into account context (False positive: CVE-2023-24805 in cups-filters #33).
For the second solution: This would require the online tool to provide updated severity ratings for CVEs taking into account context (#33).
The text was updated successfully, but these errors were encountered:
Running the local scanner on the testcase at https://github.com/Nix-Security-WG/nix-security-tracker/tree/cbe45b19d4b97520173c48defa4c6747156d6dcf, it reports CVE-2023-38253 in w3m.
While this looks like a legitimate DoS vulnerability when w3m is used with untrusted HTML sites, it is not applicable here: the w3m dependency comes in via nixos-help:
So w3m is used to browse nixos-help here if no other browser is found. While in theory nixos-help may have outbound links that might not be trusted, or the user could use nixos-help to enter w3m and then visit random URLs, but that seems unlikely.
We might want to either:
For the first solution: the issue carries two severity ratings: a
Low
rating based on https://access.redhat.com/security/updates/classification/ , and aMEDIUM
CVSS score. These kinds of nuances are hard to encode into CVSS. We could:For the second solution: This would require the online tool to provide updated severity ratings for CVEs taking into account context (#33).
The text was updated successfully, but these errors were encountered: