Published
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
7 packages
- nebula-sans
- ant-nebula-theme
- nebula-lighthouse-service
- terraform-providers.opennebula
- python312Packages.nebula3-python
- terraform-providers.opennebula_opennebula
- python312Packages.llama-index-graph-stores-nebula
- @LeSuisse accepted
- @LeSuisse published on GitHub
Nebula Has Possible Blocklist Bypass via ECDSA Signature Malleability
Nebula is a scalable overlay networking tool. In versions from 1.7.0 to 1.10.2, when using P256 certificates (which is not the default configuration), it is possible to evade a blocklist entry created against the fingerprint of a certificate by using ECDSA Signature Malleability to use a copy of the certificate with a different fingerprint. This issue has been patched in version 1.10.3.
References
-
https://github.com/slackhq/nebula/security/advisories/GHSA-69x3-g4r3-p962 x_refsource_CONFIRM
-
https://github.com/slackhq/nebula/security/advisories/GHSA-69x3-g4r3-p962 x_refsource_CONFIRM
Affected products
nebula
- ==>= 1.7.0, < 1.10.3
Package maintainers
-
@numinit Morgan Jones <me+nixpkgs@numin.it>
-
@Br1ght0ne Oleksii Filonenko <brightone@protonmail.com>