Skip to content

Commit 5b6e1bb

Browse files
committed
chore: update security scan results
- Updated scan data from workflow run 82 - Scan mode: git-only - Total scanned: 113 - Total vulnerabilities: 369
1 parent c69dbc9 commit 5b6e1bb

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+428
-158
lines changed

data/master-5c5eb99eab.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"release_version": "master-5c5eb99eab",
3-
"scan_date": "2025-09-22T00:27:45.763641Z",
3+
"scan_date": "2025-09-23T00:26:13.977037Z",
44
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],

data/release_v5.0-d9f9b7d8ed.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"release_version": "release/v5.0-d9f9b7d8ed",
3-
"scan_date": "2025-09-22T00:27:14.564101Z",
3+
"scan_date": "2025-09-23T00:25:50.637450Z",
44
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [
@@ -14,6 +14,16 @@
1414
"description": "Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, which performs a deep free(). As a result, application code that uses this function (relying only on documented behavior) is likely to still hold pointers to the memory blocks that were freed, resulting in a high risk of use-after-free or double-free. In particular, the two sample programs x509/cert_write and x509/cert_req are affected (use-after-free if the san string contains more than one DN).",
1515
"link": "https://nvd.nist.gov/vuln/detail/CVE-2025-47917"
1616
},
17+
{
18+
"cve_id": "CVE-2025-52496",
19+
"component": "mbed_tls",
20+
"component_version": "3.6.3",
21+
"severity": "HIGH",
22+
"score": "7.8",
23+
"vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
24+
"description": "Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery.",
25+
"link": "https://nvd.nist.gov/vuln/detail/CVE-2025-52496"
26+
},
1727
{
1828
"cve_id": "CVE-2025-49600",
1929
"component": "mbed_tls",
@@ -66,10 +76,10 @@
6676
}
6777
],
6878
"summary": {
69-
"total_vulnerabilities": 6,
79+
"total_vulnerabilities": 7,
7080
"by_severity": {
7181
"CRITICAL": 0,
72-
"HIGH": 1,
82+
"HIGH": 2,
7383
"MEDIUM": 5,
7484
"LOW": 0
7585
}

data/release_v5.1-4bf28d62c8.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"release_version": "release/v5.1-4bf28d62c8",
3-
"scan_date": "2025-09-22T00:26:58.650049Z",
3+
"scan_date": "2025-09-23T00:25:58.270572Z",
44
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],

data/release_v5.2-814d50bb1b.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"release_version": "release/v5.2-814d50bb1b",
3-
"scan_date": "2025-09-22T00:27:30.653793Z",
3+
"scan_date": "2025-09-23T00:26:05.684546Z",
44
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],

data/release_v5.3-b019b2e63d.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"release_version": "release/v5.3-b019b2e63d",
3-
"scan_date": "2025-09-22T00:27:23.172671Z",
3+
"scan_date": "2025-09-23T00:25:42.805384Z",
44
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],

data/release_v5.4-1bfe1595fa.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"release_version": "release/v5.4-1bfe1595fa",
3-
"scan_date": "2025-09-22T00:27:06.536949Z",
3+
"scan_date": "2025-09-23T00:25:35.447460Z",
44
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],

data/release_v5.5-4b2b5d7baf.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"release_version": "release/v5.5-4b2b5d7baf",
3-
"scan_date": "2025-09-22T00:27:38.590498Z",
3+
"scan_date": "2025-09-23T00:25:27.905549Z",
44
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],

data/scan_summary.json

Lines changed: 34 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,59 +1,59 @@
11
{
2-
"last_updated": "2025-09-22T00:27:45.764086Z",
2+
"last_updated": "2025-09-23T00:26:13.977519Z",
33
"scanned_versions": [
4-
"v5.5",
5-
"v5.2",
6-
"v5.2.2",
7-
"v5.3.1",
8-
"v5.0.6",
9-
"v5.0.8",
10-
"v5.5.1",
11-
"v5.0.5",
12-
"v5.1",
4+
"v5.0",
135
"v5.1.4",
14-
"v5.2.1",
15-
"v5.4.1",
16-
"v5.4.2",
6+
"v5.0.2",
177
"v5.2.5",
18-
"v5.4",
19-
"v5.1.5",
20-
"v5.0.1",
21-
"v5.3.4",
22-
"v5.0.7",
23-
"v5.0",
24-
"v5.1.1",
25-
"v5.1.2",
26-
"v5.2.3",
27-
"v5.1.3",
28-
"v5.0.9",
298
"v5.3.2",
9+
"v5.0.9",
10+
"v5.1.2",
11+
"v5.2",
3012
"v5.3.3",
13+
"v5.1.3",
14+
"v5.2.2",
3115
"v5.3",
32-
"v5.0.4",
33-
"v5.0.2",
16+
"v5.4.2",
17+
"v5.1.5",
18+
"v5.5.1",
19+
"v5.1.1",
3420
"v5.1.6",
35-
"v5.0.3",
21+
"v5.4.1",
3622
"v5.2.4",
37-
"release/v5.1-4bf28d62c8",
23+
"v5.3.4",
24+
"v5.0.3",
25+
"v5.1",
26+
"v5.0.5",
27+
"v5.2.3",
28+
"v5.0.7",
29+
"v5.4",
30+
"v5.5",
31+
"v5.0.1",
32+
"v5.3.1",
33+
"v5.0.4",
34+
"v5.0.6",
35+
"v5.0.8",
36+
"v5.2.1",
37+
"release/v5.5-4b2b5d7baf",
3838
"release/v5.4-1bfe1595fa",
39-
"release/v5.0-d9f9b7d8ed",
4039
"release/v5.3-b019b2e63d",
40+
"release/v5.0-d9f9b7d8ed",
41+
"release/v5.1-4bf28d62c8",
4142
"release/v5.2-814d50bb1b",
42-
"release/v5.5-4b2b5d7baf",
4343
"master-5c5eb99eab"
4444
],
4545
"failed_versions": [
46-
"release/v5.1",
46+
"release/v5.5",
4747
"release/v5.4",
48-
"release/v5.0",
4948
"release/v5.3",
49+
"release/v5.0",
50+
"release/v5.1",
5051
"release/v5.2",
51-
"release/v5.5",
5252
"master"
5353
],
5454
"total_scanned": 40,
5555
"scan_method": "git-batch",
56-
"workflow_run": "81",
56+
"workflow_run": "82",
5757
"scanner_info": {
5858
"tool": "esp-idf-security-dashboard",
5959
"esp_idf_sbom_version": "0.21.0",

data/v5.0.1.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"release_version": "v5.0.1",
3-
"scan_date": "2025-09-22T00:25:03.191144Z",
3+
"scan_date": "2025-09-23T00:24:41.157344Z",
44
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],

data/v5.0.2.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"release_version": "v5.0.2",
3-
"scan_date": "2025-09-22T00:26:32.155631Z",
3+
"scan_date": "2025-09-23T00:21:35.570585Z",
44
"tool_version": "0.21.0",
55
"total_components": 0,
66
"vulnerabilities": [],

0 commit comments

Comments
 (0)