forked from eclipse-leshan/leshan
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Refactoring rename module/package - edit file content
This aims to implement : eclipse-leshan#1295 Refactoring was done in 2 commits to try to keep git history : https://stackoverflow.com/questions/2314652/is-it-possible-to-move-rename-files-in-git-and-maintain-their-history
- Loading branch information
1 parent
34caf24
commit 6d2ff69
Showing
243 changed files
with
800 additions
and
779 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,73 +2,76 @@ | |
|
||
## Reporting a Vulnerability | ||
|
||
To report a Security issue, you can : | ||
- (**Preferred way ⭐**) create a new [Github Security Advisories](https://docs.github.com/en/code-security/security-advisories/repository-security-advisories/about-repository-security-advisories), using [this form](https://github.com/eclipse-leshan/leshan/security/advisories/new), | ||
- open a [gitlab issue](https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/new?issuable_template=new_vulnerability), | ||
- send an email to [email protected]. | ||
To report a Security issue, you can : | ||
|
||
- (**Preferred way ⭐**) create a new [Github Security Advisories](https://docs.github.com/en/code-security/security-advisories/repository-security-advisories/about-repository-security-advisories), using [this form](https://github.com/eclipse-leshan/leshan/security/advisories/new), | ||
- open a [gitlab issue](https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/new?issuable_template=new_vulnerability), | ||
- send an email to [email protected]. | ||
|
||
For more details, please look at : | ||
- https://www.eclipse.org/security/ | ||
- https://www.eclipse.org/projects/handbook/#vulnerability | ||
|
||
- https://www.eclipse.org/security/ | ||
- https://www.eclipse.org/projects/handbook/#vulnerability | ||
|
||
## Supported Versions | ||
|
||
Only Leshan library is concerned. The demos are not covered. | ||
Only Leshan library is concerned. The demos are not covered. | ||
|
||
| Version | Supported | | ||
| ------- | ------------------ | | ||
| 2.x | :heavy_check_mark: | | | ||
| 1.x | :heavy_check_mark: | | ||
| ------- | ------------------ | --- | | ||
| 2.x | :heavy_check_mark: | | | ||
| 1.x | :heavy_check_mark: | | ||
|
||
Note: ℹ️ **1.x** version depends on californium 2.x version where support is not clear. | ||
Note: ℹ️ **1.x** version depends on californium 2.x version where support is not clear. | ||
See : https://github.com/eclipse/californium/security/policy | ||
|
||
## About Leshan Demo | ||
|
||
As said previously **Leshan demos are not covered by Security Policy**. | ||
|
||
It is strongly discouraged to use Leshan demos v1.x on public server because they are using no longer maintained javascript library like : | ||
It is strongly discouraged to use Leshan demos v1.x on public server because they are using no longer maintained javascript library like : | ||
|
||
- **bootstrap.js** (pkg:javascript/[email protected]) : Bootstrap before 4.0.0 is end-of-life and no longer maintained. | ||
- **jquery-2.2.4.js** (pkg:javascript/[email protected]) : CVE-2015-9251, CVE-2019-11358, CVE-2020-11022, CVE-2020-11023, jQuery 1.x and 2.x are End-of-Life and no longer receiving security updates | ||
|
||
Concerning Leshan demos v2.x, some minimal efforts are made to update dependencies when vulnerabilities are detected but keep in mind that demos are not production ready tools. | ||
Concerning Leshan demos v2.x, some minimal efforts are made to update dependencies when vulnerabilities are detected but keep in mind that demos are not production ready tools. | ||
|
||
## Versions Security State | ||
|
||
List of version which are not affected by known vulnerability. | ||
List of version which are not affected by known vulnerability. | ||
|
||
| Version | | | ||
| -------------------- | ------------------ | | ||
| 2.0.0-M13 + | :heavy_check_mark: | | ||
| 1.5.0 + | :heavy_check_mark: | | ||
| Version | | | ||
| ----------- | ------------------ | | ||
| 2.0.0-M13 + | :heavy_check_mark: | | ||
| 1.5.0 + | :heavy_check_mark: | | ||
|
||
This is an exhaustive list of known security issue affecting leshan library : | ||
|
||
| CVE/ID | Leshan version concerned | artifacts | Affect | | ||
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| ---------------------------------------- | ---------------------| ------ | | ||
| [CVE-2023-41034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41034) <br> [GHSA-wc9j-gc65-3cm7](https://github.com/eclipse-leshan/leshan/security/advisories/GHSA-wc9j-gc65-3cm7) | 2.0.0-M1 -> 2.0.0-M12 <br> 1.0.0 -> 1.4.2| leshan-core | if you parse untrusted DDF files <br> (e.g. if they let external users provide their own model), | | ||
|
||
| CVE/ID | Leshan version concerned | artifacts | Affect | | ||
| -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------- | ----------------- | ------------------------------------------------------------------------------------------------ | | ||
| [CVE-2023-41034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41034) <br> [GHSA-wc9j-gc65-3cm7](https://github.com/eclipse-leshan/leshan/security/advisories/GHSA-wc9j-gc65-3cm7) | 2.0.0-M1 -> 2.0.0-M12 <br> 1.0.0 -> 1.4.2 | leshan-lwm2m-core | if you parse untrusted DDF files <br> (e.g. if they let external users provide their own model), | | ||
|
||
This is a not exhaustive list of security issue from Leshan dependencies which could affect Leshan : | ||
|
||
| CVE/ID | Leshan version concerned | Source | Affect | | ||
| --------------------------------------------------------------------------------------------------------| ---------------------------------------- | ---------------------| ------ | | ||
| [CVE-2022-39368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39368) | 2.0.0-M1 -> 2.0.0-M8 <br> 1.0.0 -> 1.4.1 | californium/scandium | any DTLS usage | | ||
| [CVE-2022-2576](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2576) | 2.0.0-M1 -> 2.0.0-M7 <br> 1.0.0 -> 1.4.0 | californium/scandium | DTLS_VERIFY_PEERS_ ON_RESUMPTION_THRESHOLD > 0 | | ||
| [GHSA-fj2w-wfgv-mwq6](https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6) | 2.0.0-M2 -> 2.0.0-M4 | com.upokecenter.cbor | CBOR or SenML-CBOR decoding | | ||
| [CVE-2020-27222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27222) | 1.1.0 -> 1.3.1 | californium/scandium | DTLS with x509 and/or RPK | | ||
| [CVE-2021-34433](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34433) | 2.0.0-M1 -> 2.0.0-M4 <br> 1.0.0 -> 1.3.1 | californium/scandium | DTLS with x509 and/or RPK | | ||
| CVE/ID | Leshan version concerned | Source | Affect | | ||
| ----------------------------------------------------------------------------------------------------- | ---------------------------------------- | -------------------- | ---------------------------------------------- | | ||
| [CVE-2022-39368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39368) | 2.0.0-M1 -> 2.0.0-M8 <br> 1.0.0 -> 1.4.1 | californium/scandium | any DTLS usage | | ||
| [CVE-2022-2576](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2576) | 2.0.0-M1 -> 2.0.0-M7 <br> 1.0.0 -> 1.4.0 | californium/scandium | DTLS*VERIFY_PEERS* ON_RESUMPTION_THRESHOLD > 0 | | ||
| [GHSA-fj2w-wfgv-mwq6](https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6) | 2.0.0-M2 -> 2.0.0-M4 | com.upokecenter.cbor | CBOR or SenML-CBOR decoding | | ||
| [CVE-2020-27222](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27222) | 1.1.0 -> 1.3.1 | californium/scandium | DTLS with x509 and/or RPK | | ||
| [CVE-2021-34433](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34433) | 2.0.0-M1 -> 2.0.0-M4 <br> 1.0.0 -> 1.3.1 | californium/scandium | DTLS with x509 and/or RPK | | ||
|
||
Note: We strongly encourage you to switch last safe Leshan version, but for vulnerability caused by a dependency : | ||
- if there isn't Leshan release available OR if you want to be very conservative | ||
- AND the concerned library is using [semantic versioning](https://semver.org/) | ||
|
||
then you could try to just update the dependency to a safe compatible version without upgrading Leshan. | ||
|
||
- if there isn't Leshan release available OR if you want to be very conservative | ||
- AND the concerned library is using [semantic versioning](https://semver.org/) | ||
|
||
then you could try to just update the dependency to a safe compatible version without upgrading Leshan. | ||
|
||
## Runtime Security State | ||
|
||
This is a not exhaustive list of JVM security issue which could affect common Leshan usages. | ||
|
||
| Dependency | Affected Version | Usage | Vulnerability | More Information | | ||
| ---------- | ---------------- | ----- | ------------- | ---------------- | | ||
| JDK / JCE | <= 15.0.2? <br/> <= 16.0.2? <br/> < 17.0.3 <br/> < 18.0.1 | Cipher Suite based on ECDSA | ECDSA [CVE-2022-21449](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449) | https://github.com/eclipse/leshan/issues/1243 | | ||
| Dependency | Affected Version | Usage | Vulnerability | More Information | | ||
| ---------- | --------------------------------------------------------- | --------------------------- | ------------------------------------------------------------------------------------- | --------------------------------------------- | | ||
| JDK / JCE | <= 15.0.2? <br/> <= 16.0.2? <br/> < 17.0.3 <br/> < 18.0.1 | Cipher Suite based on ECDSA | ECDSA [CVE-2022-21449](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449) | https://github.com/eclipse/leshan/issues/1243 | |
Oops, something went wrong.