Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Outdated dependencies cause CVEs - please upgrade dependencies #28320

Closed
synergiator opened this issue Sep 9, 2024 · 1 comment · Fixed by #28407
Closed

Outdated dependencies cause CVEs - please upgrade dependencies #28320

synergiator opened this issue Sep 9, 2024 · 1 comment · Fixed by #28407
Labels
dependencies Pull requests that update a dependency file

Comments

@synergiator
Copy link

Known transitive dependency on okta sdk but also very recent golang issues need a new release with up to date dependencies!

Current trivy report for latest Vault release:

usr/local/bin/vault (gobinary)
==============================
Total: 4 (UNKNOWN: 0, LOW: 0, MEDIUM: 3, HIGH: 1, CRITICAL: 0)

┌────────────────────────────┬────────────────┬──────────┬──────────┬───────────────────┬────────────────┬─────────────────────────────────────────────────────────────┐
│          Library           │ Vulnerability  │ Severity │  Status  │ Installed Version │ Fixed Version  │                            Title                            │
├────────────────────────────┼────────────────┼──────────┼──────────┼───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤
│ gopkg.in/square/go-jose.v2 │ CVE-2024-28180 │ MEDIUM   │ affected │ v2.6.0            │                │ jose-go: improper handling of highly compressed data        │
│                            │                │          │          │                   │                │ https://avd.aquasec.com/nvd/cve-2024-28180                  │
├────────────────────────────┼────────────────┼──────────┼──────────┼───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤
│ stdlib                     │ CVE-2024-34156 │ HIGH     │ fixed    │ 1.22.6            │ 1.22.7, 1.23.1 │ encoding/gob: golang: Calling Decoder.Decode on a message   │
│                            │                │          │          │                   │                │ which contains deeply nested structures...                  │
│                            │                │          │          │                   │                │ https://avd.aquasec.com/nvd/cve-2024-34156                  │
│                            ├────────────────┼──────────┤          │                   │                ├─────────────────────────────────────────────────────────────┤
│                            │ CVE-2024-34155 │ MEDIUM   │          │                   │                │ go/parser: golang: Calling any of the Parse functions       │
│                            │                │          │          │                   │                │ containing deeply nested literals...                        │
│                            │                │          │          │                   │                │ https://avd.aquasec.com/nvd/cve-2024-34155                  │
│                            ├────────────────┤          │          │                   │                ├─────────────────────────────────────────────────────────────┤
│                            │ CVE-2024-34158 │          │          │                   │                │ go/build/constraint: golang: Calling Parse on a "// +build" │
│                            │                │          │          │                   │                │ build tag line with...                                      │
│                            │                │          │          │                   │                │ https://avd.aquasec.com/nvd/cve-2024-34158                  │
└────────────────────────────┴────────────────┴──────────┴──────────┴───────────────────┴────────────────┴─────────────────────────────────────────────────────────────┘
@heatherezell
Copy link
Contributor

Please email [email protected] to report security issues.
Cc: @mickael-hc

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants