-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Update to OpenSSL 3.0.13 - tracking some minor OpenSSL 3.0.8 vulnerabilities #2639
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Was this intended to be an Nmap issue rather than an Npcap issue? |
Thanks @guyharris, you're right. I'll move it. Some days I just have Npcap on the brain :). |
This comment was marked as off-topic.
This comment was marked as off-topic.
I've updated this issue to note that we included the then-latest OpenSSL 3.0.8 in the May 19 release of Nmap 7.94. Then OpenSSL 3.0.9 was released on May 30. I also just added CVE-2023-2650, which has also been fixed in 3.0.9. While none of these CVE's affect Nmap (generally since it doesn't use the features involved), we understand that users don't like to even have the "vulnerable" DLL's on their system. So we'll make sure to upgrade to 3.0.9 for the next release. |
Now OpenSSL 3.0.13 CVE-2024-0727, CVE-2023-6237 and CVE-2023-6129 |
Resolved with Nmap 7.95. |
Update (March 11, 2024): Actually it look like we'll be able to get OpenSSL 3.0.13 into the Nmap release which is coming very soon.
UPDATE (Jan 25, 2024): Updated title to OpenSSL 3.0.12 since we're planning to upgrade to that version before the upcoming Nmap 7.95 release.
UPDATE (July 17, 2023): Nmap Version 7.94 was released on May 19, 2023 with the then-latest OpenSSL Version 3.08.
OpenSSL 3.0.9 was released on May 30, 2023 and will be included with the next Nmap release.
We're planning to include the newest OpenSSL version (3.0.8) in the upcoming Nmap release Windows and Mac builds unless an even newer version of OpenSSL is released by then. OpenSSL already has 4 CVE's issued against Version 3.0.8, but the OpenSSL team considers their severity to be so low that they aren't creating a special fixed release. Also Nmap itself isn't vulnerable to any of them. Our Ncat program could be affected if you use it with the non-default --ssl-verify option. We are tracking the issues here, and further information is available from the OpenSSL Security Vulnerabilities Page. Once OpenSSL puts out a a fixed 3.0.9 release, we plan to update our Nmap Windows and Mac builds and then include those with our next release. Then we'll close this issue.
CVE-2023-0464 - Excessive Resource Usage Verifying X.509 Policy Constraints
vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems." and "Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available."
CVE-2023-0465 - Invalid certificate policies in leaf certificates are silently ignored
CVE-2023-0466 - Certificate policy check not enabled
CVE-2023-1255 - "input buffer over-read in AES-XTS implementation on 64 bit ARM
CVE-2023-2650 - "Possible DoS translating ASN.1 object identifiers"
data containing them may be very slow."
The text was updated successfully, but these errors were encountered: