Skip to content

Commit 23fc8b1

Browse files
committed
chore: update security scan results
- Updated scan data from workflow run 16 - Scan mode: git-only - Total scanned: 47 - Total vulnerabilities: 272
1 parent 05c7cf5 commit 23fc8b1

39 files changed

+163
-171
lines changed

data/master-bfe5caf58f.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"release_version": "master-bfe5caf58f",
3-
"scan_date": "2025-07-22T00:27:47.082727Z",
4-
"tool_version": "0.20.1",
3+
"scan_date": "2025-07-23T00:27:29.906473Z",
4+
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [
77
{

data/release_v5.0-d9f9b7d8ed.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"release_version": "release/v5.0-d9f9b7d8ed",
3-
"scan_date": "2025-07-22T00:26:59.794376Z",
4-
"tool_version": "0.20.1",
3+
"scan_date": "2025-07-23T00:27:13.836746Z",
4+
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [
77
{

data/release_v5.1-83f5d0eefc.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"release_version": "release/v5.1-83f5d0eefc",
3-
"scan_date": "2025-07-22T00:27:39.041259Z",
4-
"tool_version": "0.20.1",
3+
"scan_date": "2025-07-23T00:27:06.661391Z",
4+
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],
77
"summary": {

data/release_v5.2-1a4fd9b80b.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"release_version": "release/v5.2-1a4fd9b80b",
3-
"scan_date": "2025-07-22T00:27:15.958304Z",
4-
"tool_version": "0.20.1",
3+
"scan_date": "2025-07-23T00:26:51.510905Z",
4+
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],
77
"summary": {

data/release_v5.3-bf79937908.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"release_version": "release/v5.3-bf79937908",
3-
"scan_date": "2025-07-22T00:27:31.930641Z",
4-
"tool_version": "0.20.1",
3+
"scan_date": "2025-07-23T00:26:44.237174Z",
4+
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [
77
{

data/release_v5.4-f10ac3eec2.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"release_version": "release/v5.4-f10ac3eec2",
3-
"scan_date": "2025-07-22T00:27:08.446635Z",
4-
"tool_version": "0.20.1",
3+
"scan_date": "2025-07-23T00:26:59.138301Z",
4+
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [
77
{

data/release_v5.5-b66b5448e0.json

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"release_version": "release/v5.5-b66b5448e0",
3+
"scan_date": "2025-07-23T00:27:22.627274Z",
4+
"tool_version": "0.21.0",
5+
"total_components": 0,
6+
"vulnerabilities": [
7+
{
8+
"cve_id": "CVE-2025-49600",
9+
"component": "mbed_tls",
10+
"component_version": "3.6.3",
11+
"severity": "MEDIUM",
12+
"score": "4.9",
13+
"vector": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
14+
"description": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in mbedtls_lms_verify allow an attacker (who can induce a hardware hash accelerator fault) to bypass LMS signature verification by reusing stale stack data, resulting in acceptance of an invalid signature. In mbedtls_lms_verify, the return values of the internal Merkle tree functions create_merkle_leaf_value and create_merkle_internal_value are not checked. These functions return an integer that indicates whether the call succeeded or not. If a failure occurs, the output buffer (Tc_candidate_root_node) may remain uninitialized, and the result of the signature verification is unpredictable. When the software implementation of SHA-256 is used, these functions will not fail. However, with hardware-accelerated hashing, an attacker could use fault injection against the accelerator to bypass verification.",
15+
"link": "https://nvd.nist.gov/vuln/detail/CVE-2025-49600"
16+
},
17+
{
18+
"cve_id": "CVE-2025-49601",
19+
"component": "mbed_tls",
20+
"component_version": "3.6.3",
21+
"severity": "MEDIUM",
22+
"score": "4.8",
23+
"vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
24+
"description": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.",
25+
"link": "https://nvd.nist.gov/vuln/detail/CVE-2025-49601"
26+
},
27+
{
28+
"cve_id": "CVE-2025-52497",
29+
"component": "mbed_tls",
30+
"component_version": "3.6.3",
31+
"severity": "MEDIUM",
32+
"score": "4.8",
33+
"vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
34+
"description": "Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input.",
35+
"link": "https://nvd.nist.gov/vuln/detail/CVE-2025-52497"
36+
}
37+
],
38+
"summary": {
39+
"total_vulnerabilities": 3,
40+
"by_severity": {
41+
"CRITICAL": 0,
42+
"HIGH": 0,
43+
"MEDIUM": 3,
44+
"LOW": 0
45+
}
46+
},
47+
"metadata": {
48+
"scanner": "esp-idf-security-dashboard",
49+
"scan_method": "git-release-branch",
50+
"docker_image": null
51+
}
52+
}

data/scan_summary.json

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,60 +1,60 @@
11
{
2-
"last_updated": "2025-07-22T00:27:47.083279Z",
2+
"last_updated": "2025-07-23T00:27:29.907017Z",
33
"scanned_versions": [
4+
"v5.0",
45
"v5.4",
5-
"v5.0.8",
6-
"v5.2",
6+
"v5.3",
7+
"v5.0.6",
8+
"v5.3.1",
9+
"v5.0.3",
10+
"v5.2.5",
11+
"v5.5",
12+
"v5.2.3",
713
"v5.0.5",
14+
"v5.2.1",
15+
"v5.1.3",
16+
"v5.1.5",
817
"v5.1.6",
9-
"v5.1.4",
1018
"v5.1.2",
1119
"v5.3.2",
20+
"v5.0.8",
21+
"v5.0.4",
22+
"v5.1.4",
1223
"v5.0.2",
13-
"v5.1",
14-
"v5.3",
1524
"v5.4.1",
16-
"v5.5",
17-
"v5.3.3",
18-
"v5.2.4",
19-
"v5.0.7",
2025
"v5.4.2",
21-
"v5.3.1",
22-
"v5.2.3",
2326
"v5.0.9",
24-
"v5.2.1",
2527
"v5.2.2",
26-
"v5.0.4",
27-
"v5.1.3",
28-
"v5.0.1",
29-
"v5.1.5",
28+
"v5.3.3",
29+
"v5.2.4",
30+
"v5.2",
31+
"v5.0.7",
3032
"v5.1.1",
31-
"v5.0.3",
32-
"v5.0",
33-
"v5.0.6",
34-
"v5.2.5",
35-
"release/v5.0-d9f9b7d8ed",
36-
"release/v5.4-f10ac3eec2",
37-
"release/v5.2-1a4fd9b80b",
38-
"release/v5.5-25c7c11970",
33+
"v5.0.1",
34+
"v5.1",
3935
"release/v5.3-bf79937908",
36+
"release/v5.2-1a4fd9b80b",
37+
"release/v5.4-f10ac3eec2",
4038
"release/v5.1-83f5d0eefc",
39+
"release/v5.0-d9f9b7d8ed",
40+
"release/v5.5-b66b5448e0",
4141
"master-bfe5caf58f"
4242
],
4343
"failed_versions": [
44-
"release/v5.0",
45-
"release/v5.4",
46-
"release/v5.2",
47-
"release/v5.5",
4844
"release/v5.3",
45+
"release/v5.2",
46+
"release/v5.4",
4947
"release/v5.1",
48+
"release/v5.0",
49+
"release/v5.5",
5050
"master"
5151
],
5252
"total_scanned": 38,
5353
"scan_method": "git-batch",
54-
"workflow_run": "15",
54+
"workflow_run": "16",
5555
"scanner_info": {
5656
"tool": "esp-idf-security-dashboard",
57-
"esp_idf_sbom_version": "0.20.1",
57+
"esp_idf_sbom_version": "0.21.0",
5858
"batch_mode_used": true
5959
}
6060
}

data/v5.0.1.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"release_version": "v5.0.1",
3-
"scan_date": "2025-07-22T00:26:18.813161Z",
4-
"tool_version": "0.20.1",
3+
"scan_date": "2025-07-23T00:26:33.128133Z",
4+
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],
77
"summary": {

data/v5.0.2.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"release_version": "v5.0.2",
3-
"scan_date": "2025-07-22T00:24:25.424455Z",
4-
"tool_version": "0.20.1",
3+
"scan_date": "2025-07-23T00:25:22.434137Z",
4+
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],
77
"summary": {

0 commit comments

Comments
 (0)