{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-234e38fb",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-9230: OsPackageVulnerability\u000a\u000aIssue summary: An application trying to decrypt CMS messages encrypted ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9230**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.4-r0|[CVE-2025-9230](https://avd.aquasec.com/nvd/cve-2025-9230)|\u000a\u000aIssue summary: An application trying to decrypt CMS messages encrypted using\u000apassword based encryption can trigger an out-of-bounds read and write.\u000a\u000aImpact summary: This out-of-bounds read may trigger a crash which leads to\u000aDenial of Service for an application. The out-of-bounds write can cause\u000aa memory corruption which can have various consequences including\u000aa Denial of Service or Execution of attacker-supplied code.\u000a\u000aAlthough the consequences of a successful exploit of this vulnerability\u000acould be severe, the probability that the attacker would be able to\u000aperform it is low. Besides, password based (PWRI) encryption support in CMS\u000amessages is very rarely used. For that reason the issue was assessed as\u000aModerate severity according to our Security Policy.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as the CMS implementation is outside the OpenSSL FIPS module\u000aboundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9230\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9230](https://avd.aquasec.com/nvd/cve-2025-9230)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1288",
      "severity" : "NORMAL",
      "toString" : "govway(1,0): CVE-2025-9230: : CVE-2025-9230: OsPackageVulnerability\u000a\u000aIssue summary: An application trying to decrypt CMS messages encrypted ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9230**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.4-r0|[CVE-2025-9230](https://avd.aquasec.com/nvd/cve-2025-9230)|\u000a\u000aIssue summary: An application trying to decrypt CMS messages encrypted using\u000apassword based encryption can trigger an out-of-bounds read and write.\u000a\u000aImpact summary: This out-of-bounds read may trigger a crash which leads to\u000aDenial of Service for an application. The out-of-bounds write can cause\u000aa memory corruption which can have various consequences including\u000aa Denial of Service or Execution of attacker-supplied code.\u000a\u000aAlthough the consequences of a successful exploit of this vulnerability\u000acould be severe, the probability that the attacker would be able to\u000aperform it is low. Besides, password based (PWRI) encryption support in CMS\u000amessages is very rarely used. For that reason the issue was assessed as\u000aModerate severity according to our Security Policy.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as the CMS implementation is outside the OpenSSL FIPS module\u000aboundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9230\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9230](https://avd.aquasec.com/nvd/cve-2025-9230)",
      "type" : "CVE-2025-9230"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-234e38fb",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-9230: OsPackageVulnerability\u000a\u000aIssue summary: An application trying to decrypt CMS messages encrypted ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9230**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.4-r0|[CVE-2025-9230](https://avd.aquasec.com/nvd/cve-2025-9230)|\u000a\u000aIssue summary: An application trying to decrypt CMS messages encrypted using\u000apassword based encryption can trigger an out-of-bounds read and write.\u000a\u000aImpact summary: This out-of-bounds read may trigger a crash which leads to\u000aDenial of Service for an application. The out-of-bounds write can cause\u000aa memory corruption which can have various consequences including\u000aa Denial of Service or Execution of attacker-supplied code.\u000a\u000aAlthough the consequences of a successful exploit of this vulnerability\u000acould be severe, the probability that the attacker would be able to\u000aperform it is low. Besides, password based (PWRI) encryption support in CMS\u000amessages is very rarely used. For that reason the issue was assessed as\u000aModerate severity according to our Security Policy.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as the CMS implementation is outside the OpenSSL FIPS module\u000aboundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9230\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9230](https://avd.aquasec.com/nvd/cve-2025-9230)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1288",
      "severity" : "NORMAL",
      "toString" : "govway(1,0): CVE-2025-9230: : CVE-2025-9230: OsPackageVulnerability\u000a\u000aIssue summary: An application trying to decrypt CMS messages encrypted ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9230**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.4-r0|[CVE-2025-9230](https://avd.aquasec.com/nvd/cve-2025-9230)|\u000a\u000aIssue summary: An application trying to decrypt CMS messages encrypted using\u000apassword based encryption can trigger an out-of-bounds read and write.\u000a\u000aImpact summary: This out-of-bounds read may trigger a crash which leads to\u000aDenial of Service for an application. The out-of-bounds write can cause\u000aa memory corruption which can have various consequences including\u000aa Denial of Service or Execution of attacker-supplied code.\u000a\u000aAlthough the consequences of a successful exploit of this vulnerability\u000acould be severe, the probability that the attacker would be able to\u000aperform it is low. Besides, password based (PWRI) encryption support in CMS\u000amessages is very rarely used. For that reason the issue was assessed as\u000aModerate severity according to our Security Policy.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as the CMS implementation is outside the OpenSSL FIPS module\u000aboundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9230\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9230](https://avd.aquasec.com/nvd/cve-2025-9230)",
      "type" : "CVE-2025-9230"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-236ad1ec",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-9231: OsPackageVulnerability\u000a\u000aIssue summary: A timing side-channel which could potentially allow rem ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9231**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.4-r0|[CVE-2025-9231](https://avd.aquasec.com/nvd/cve-2025-9231)|\u000a\u000aIssue summary: A timing side-channel which could potentially allow remote\u000arecovery of the private key exists in the SM2 algorithm implementation on 64 bit\u000aARM platforms.\u000a\u000aImpact summary: A timing side-channel in SM2 signature computations on 64 bit\u000aARM platforms could allow recovering the private key by an attacker..\u000a\u000aWhile remote key recovery over a network was not attempted by the reporter,\u000atiming measurements revealed a timing signal which may allow such an attack.\u000a\u000aOpenSSL does not directly support certificates with SM2 keys in TLS, and so\u000athis CVE is not relevant in most TLS contexts.  However, given that it is\u000apossible to add support for such certificates via a custom provider, coupled\u000awith the fact that in such a custom provider context the private key may be\u000arecoverable via remote timing measurements, we consider this to be a Moderate\u000aseverity issue.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as SM2 is not an approved algorithm.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9231\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9231](https://avd.aquasec.com/nvd/cve-2025-9231)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1288",
      "severity" : "NORMAL",
      "toString" : "govway(1,0): CVE-2025-9231: : CVE-2025-9231: OsPackageVulnerability\u000a\u000aIssue summary: A timing side-channel which could potentially allow rem ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9231**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.4-r0|[CVE-2025-9231](https://avd.aquasec.com/nvd/cve-2025-9231)|\u000a\u000aIssue summary: A timing side-channel which could potentially allow remote\u000arecovery of the private key exists in the SM2 algorithm implementation on 64 bit\u000aARM platforms.\u000a\u000aImpact summary: A timing side-channel in SM2 signature computations on 64 bit\u000aARM platforms could allow recovering the private key by an attacker..\u000a\u000aWhile remote key recovery over a network was not attempted by the reporter,\u000atiming measurements revealed a timing signal which may allow such an attack.\u000a\u000aOpenSSL does not directly support certificates with SM2 keys in TLS, and so\u000athis CVE is not relevant in most TLS contexts.  However, given that it is\u000apossible to add support for such certificates via a custom provider, coupled\u000awith the fact that in such a custom provider context the private key may be\u000arecoverable via remote timing measurements, we consider this to be a Moderate\u000aseverity issue.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as SM2 is not an approved algorithm.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9231\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9231](https://avd.aquasec.com/nvd/cve-2025-9231)",
      "type" : "CVE-2025-9231"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-236ad1ec",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-9231: OsPackageVulnerability\u000a\u000aIssue summary: A timing side-channel which could potentially allow rem ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9231**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.4-r0|[CVE-2025-9231](https://avd.aquasec.com/nvd/cve-2025-9231)|\u000a\u000aIssue summary: A timing side-channel which could potentially allow remote\u000arecovery of the private key exists in the SM2 algorithm implementation on 64 bit\u000aARM platforms.\u000a\u000aImpact summary: A timing side-channel in SM2 signature computations on 64 bit\u000aARM platforms could allow recovering the private key by an attacker..\u000a\u000aWhile remote key recovery over a network was not attempted by the reporter,\u000atiming measurements revealed a timing signal which may allow such an attack.\u000a\u000aOpenSSL does not directly support certificates with SM2 keys in TLS, and so\u000athis CVE is not relevant in most TLS contexts.  However, given that it is\u000apossible to add support for such certificates via a custom provider, coupled\u000awith the fact that in such a custom provider context the private key may be\u000arecoverable via remote timing measurements, we consider this to be a Moderate\u000aseverity issue.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as SM2 is not an approved algorithm.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9231\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9231](https://avd.aquasec.com/nvd/cve-2025-9231)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1288",
      "severity" : "NORMAL",
      "toString" : "govway(1,0): CVE-2025-9231: : CVE-2025-9231: OsPackageVulnerability\u000a\u000aIssue summary: A timing side-channel which could potentially allow rem ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9231**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.4-r0|[CVE-2025-9231](https://avd.aquasec.com/nvd/cve-2025-9231)|\u000a\u000aIssue summary: A timing side-channel which could potentially allow remote\u000arecovery of the private key exists in the SM2 algorithm implementation on 64 bit\u000aARM platforms.\u000a\u000aImpact summary: A timing side-channel in SM2 signature computations on 64 bit\u000aARM platforms could allow recovering the private key by an attacker..\u000a\u000aWhile remote key recovery over a network was not attempted by the reporter,\u000atiming measurements revealed a timing signal which may allow such an attack.\u000a\u000aOpenSSL does not directly support certificates with SM2 keys in TLS, and so\u000athis CVE is not relevant in most TLS contexts.  However, given that it is\u000apossible to add support for such certificates via a custom provider, coupled\u000awith the fact that in such a custom provider context the private key may be\u000arecoverable via remote timing measurements, we consider this to be a Moderate\u000aseverity issue.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as SM2 is not an approved algorithm.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9231\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9231](https://avd.aquasec.com/nvd/cve-2025-9231)",
      "type" : "CVE-2025-9231"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-52cf0ca2",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-9232: OsPackageVulnerability\u000a\u000aIssue summary: An application using the OpenSSL HTTP client API functi ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9232**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.4-r0|[CVE-2025-9232](https://avd.aquasec.com/nvd/cve-2025-9232)|\u000a\u000aIssue summary: An application using the OpenSSL HTTP client API functions may\u000atrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\u000athe host portion of the authority component of the HTTP URL is an IPv6 address.\u000a\u000aImpact summary: An out-of-bounds read can trigger a crash which leads to\u000aDenial of Service for an application.\u000a\u000aThe OpenSSL HTTP client API functions can be used directly by applications\u000abut they are also used by the OCSP client functions and CMP (Certificate\u000aManagement Protocol) client implementation in OpenSSL. However the URLs used\u000aby these implementations are unlikely to be controlled by an attacker.\u000a\u000aIn this vulnerable code the out of bounds read can only trigger a crash.\u000aFurthermore the vulnerability requires an attacker-controlled URL to be\u000apassed from an application to the OpenSSL function and the user has to have\u000aa 'no_proxy' environment variable set. For the aforementioned reasons the\u000aissue was assessed as Low severity.\u000a\u000aThe vulnerable code was introduced in the following patch releases:\u000a3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as the HTTP client implementation is outside the OpenSSL FIPS module\u000aboundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9232\u000aSeverity: LOW\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9232](https://avd.aquasec.com/nvd/cve-2025-9232)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1288",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2025-9232: : CVE-2025-9232: OsPackageVulnerability\u000a\u000aIssue summary: An application using the OpenSSL HTTP client API functi ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9232**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.4-r0|[CVE-2025-9232](https://avd.aquasec.com/nvd/cve-2025-9232)|\u000a\u000aIssue summary: An application using the OpenSSL HTTP client API functions may\u000atrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\u000athe host portion of the authority component of the HTTP URL is an IPv6 address.\u000a\u000aImpact summary: An out-of-bounds read can trigger a crash which leads to\u000aDenial of Service for an application.\u000a\u000aThe OpenSSL HTTP client API functions can be used directly by applications\u000abut they are also used by the OCSP client functions and CMP (Certificate\u000aManagement Protocol) client implementation in OpenSSL. However the URLs used\u000aby these implementations are unlikely to be controlled by an attacker.\u000a\u000aIn this vulnerable code the out of bounds read can only trigger a crash.\u000aFurthermore the vulnerability requires an attacker-controlled URL to be\u000apassed from an application to the OpenSSL function and the user has to have\u000aa 'no_proxy' environment variable set. For the aforementioned reasons the\u000aissue was assessed as Low severity.\u000a\u000aThe vulnerable code was introduced in the following patch releases:\u000a3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as the HTTP client implementation is outside the OpenSSL FIPS module\u000aboundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9232\u000aSeverity: LOW\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9232](https://avd.aquasec.com/nvd/cve-2025-9232)",
      "type" : "CVE-2025-9232"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-52cf0ca2",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-9232: OsPackageVulnerability\u000a\u000aIssue summary: An application using the OpenSSL HTTP client API functi ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9232**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.4-r0|[CVE-2025-9232](https://avd.aquasec.com/nvd/cve-2025-9232)|\u000a\u000aIssue summary: An application using the OpenSSL HTTP client API functions may\u000atrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\u000athe host portion of the authority component of the HTTP URL is an IPv6 address.\u000a\u000aImpact summary: An out-of-bounds read can trigger a crash which leads to\u000aDenial of Service for an application.\u000a\u000aThe OpenSSL HTTP client API functions can be used directly by applications\u000abut they are also used by the OCSP client functions and CMP (Certificate\u000aManagement Protocol) client implementation in OpenSSL. However the URLs used\u000aby these implementations are unlikely to be controlled by an attacker.\u000a\u000aIn this vulnerable code the out of bounds read can only trigger a crash.\u000aFurthermore the vulnerability requires an attacker-controlled URL to be\u000apassed from an application to the OpenSSL function and the user has to have\u000aa 'no_proxy' environment variable set. For the aforementioned reasons the\u000aissue was assessed as Low severity.\u000a\u000aThe vulnerable code was introduced in the following patch releases:\u000a3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as the HTTP client implementation is outside the OpenSSL FIPS module\u000aboundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9232\u000aSeverity: LOW\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9232](https://avd.aquasec.com/nvd/cve-2025-9232)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1288",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2025-9232: : CVE-2025-9232: OsPackageVulnerability\u000a\u000aIssue summary: An application using the OpenSSL HTTP client API functi ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-9232**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.4-r0|[CVE-2025-9232](https://avd.aquasec.com/nvd/cve-2025-9232)|\u000a\u000aIssue summary: An application using the OpenSSL HTTP client API functions may\u000atrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\u000athe host portion of the authority component of the HTTP URL is an IPv6 address.\u000a\u000aImpact summary: An out-of-bounds read can trigger a crash which leads to\u000aDenial of Service for an application.\u000a\u000aThe OpenSSL HTTP client API functions can be used directly by applications\u000abut they are also used by the OCSP client functions and CMP (Certificate\u000aManagement Protocol) client implementation in OpenSSL. However the URLs used\u000aby these implementations are unlikely to be controlled by an attacker.\u000a\u000aIn this vulnerable code the out of bounds read can only trigger a crash.\u000aFurthermore the vulnerability requires an attacker-controlled URL to be\u000apassed from an application to the OpenSSL function and the user has to have\u000aa 'no_proxy' environment variable set. For the aforementioned reasons the\u000aissue was assessed as Low severity.\u000a\u000aThe vulnerable code was introduced in the following patch releases:\u000a3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue, as the HTTP client implementation is outside the OpenSSL FIPS module\u000aboundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.3-r1\u000aVulnerability CVE-2025-9232\u000aSeverity: LOW\u000aFixed Version: 3.5.4-r0\u000aLink: [CVE-2025-9232](https://avd.aquasec.com/nvd/cve-2025-9232)",
      "type" : "CVE-2025-9232"
    }
  ],
  "size" : 6,
  "toString" : "6 warnings (normal: 4, low: 2)"
}