Skip to content

Commit

Permalink
Merge pull request #32 from conjurdemos/izgeri-patch-1
Browse files Browse the repository at this point in the history
Create .trivyignore
  • Loading branch information
Geri Jennings authored Mar 11, 2021
2 parents bad13a1 + 1852055 commit 70be07e
Showing 1 changed file with 41 additions and 0 deletions.
41 changes: 41 additions & 0 deletions .trivyignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
# CVE-2021-23840
# Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow
# the output length argument in some cases where the input length is close to the
# maximum permissable length for an integer on the platform. In such cases the return
# value from the function call will be 1 (indicating success), but the output length
# value will be negative. This could cause applications to behave incorrectly or crash.
# OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions
# should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by
# this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public
# updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other
# users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i).
# Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
#
# We've determined that we are not impacted by this vulnerability because:
# - we do not directly make any calls to the affected methods
#
# Performed by @daneleblanc, approved by @andytinkham
CVE-2021-23840

# CVE-2021-23840
# The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a
# unique hash value based on the issuer and serial number data contained within an X509
# certificate. However it fails to correctly handle any errors that may occur while
# parsing the issuer field (which might occur if the issuer field is maliciously
# constructed). This may subsequently result in a NULL pointer deref and a crash
# leading to a potential denial of service attack. The function
# X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so
# applications are only vulnerable if they use this function directly and they use
# it on certificates that may have been obtained from untrusted sources. OpenSSL
# versions 1.1.1i and below are affected by this issue. Users of these versions should
# upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this
# issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates.
# Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should
# upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y
# (Affected 1.0.2-1.0.2x).
#
# We've determined that we are not impacted by this vulnerability because:
# - we do not directly make any calls to the affected methods
#
# Performed by @daneleblanc, approved by @andytinkham
CVE-2021-23841

0 comments on commit 70be07e

Please sign in to comment.