mirror of
https://github.com/freedomofpress/dangerzone.git
synced 2025-04-28 09:52:37 +02:00

Ignore CVE-2023-28322 from our security scans, because it targets `libcurl`, which is not used/exploitable in our offline container.
53 lines
2.5 KiB
YAML
53 lines
2.5 KiB
YAML
# This configuration file will be used to track CVEs that we can ignore for the
|
|
# latest release of Dangerzone, and offer our analysis.
|
|
|
|
ignore:
|
|
# CVE-2023-1255
|
|
# =============
|
|
#
|
|
# NVD Entry: https://nvd.nist.gov/vuln/detail/CVE-2023-1255
|
|
# Verdict: Dangerzone is not affected. The rationale is the following:
|
|
#
|
|
# 1. This CVE affects software that performs encryption, typically disk
|
|
# encryption, which is not the case for Dangerzone.
|
|
# 2. The NVD entry reports the severity of this CVE as "Medium", which is
|
|
# yet another sign that we can ignore it.
|
|
# 3. The worst outcome is denial of service, which is acceptable in our
|
|
# case.
|
|
- vulnerability: CVE-2023-1255
|
|
|
|
# CVE-2023-28879
|
|
# ==============
|
|
#
|
|
# NVD Entry: https://nvd.nist.gov/vuln/detail/CVE-2023-28879
|
|
# Write up: https://offsec.almond.consulting/ghostscript-cve-2023-28879.html
|
|
# Verdict: Dangerzone is not affected. The rationale is the following:
|
|
#
|
|
# 1. This CVE affects the PostScript interpreter of Ghostscript (i.e., .ps
|
|
# files). This is evident from the write up, and the PoCs in GitHub:
|
|
# https://github.com/AlmondOffSec/PoCs/tree/master/Ghostscript_rce
|
|
# 2. Dangerzone does not accept .ps files. The GUI does not allow users to
|
|
# select them and, even if you force them through the CLI, Dangerone will
|
|
# report that "The document format is not supported".
|
|
# 3. Depending on the document type, the first conversion command will
|
|
# either be LibreOffice, GraphicsMagick, or pdftoppm. None of these
|
|
# commands call a Ghostscript binary
|
|
# (see here for the list of Ghostscript binaries:
|
|
# https://pkgs.alpinelinux.org/contents?branch=edge&name=ghostscript&arch=x86&repo=main)
|
|
# 4. We tested out removing the GhostScript package from the container
|
|
# image. We verified that the only place where a Ghostscript binary is
|
|
# used is when compressing the final PDF (ps2pdf). The compression takes
|
|
# place after the document has been converted to pixels, so the attacker
|
|
# has no control over it.
|
|
- vulnerability: CVE-2023-28879
|
|
|
|
# CVE-2023-28322
|
|
# ==============
|
|
#
|
|
# NVD Entry: https://nvd.nist.gov/vuln/detail/CVE-2023-28322
|
|
# Verdict: Dangerzone is not affected. The rationale is the following:
|
|
#
|
|
# 1. The CVE targets `libcurl`, which to the best of our knowledge is not
|
|
# used in the container.
|
|
# 2. The container is offline, so the attack does not apply to it.
|
|
- vulnerability: CVE-2023-28322
|