Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Testing auto-creation of subdirs #4270

Merged
merged 1 commit into from Apr 19, 2024
Merged

Testing auto-creation of subdirs #4270

merged 1 commit into from Apr 19, 2024

Conversation

nicholasdille
Copy link
Contributor

No description provided.

Copy link

github-actions bot commented Apr 19, 2024

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/container2wasm:0.6.3

📦 Image Reference ghcr.io/uniget-org/tools/container2wasm:0.6.3
digestsha256:9a1b04f1d001e82b4e2d60c6722d7474c0a08e2263892239b421a2cfa531fe45
vulnerabilitiescritical: 0 high: 0 medium: 1 low: 0 unspecified: 6
platformlinux/amd64
size10 MB
packages24
critical: 0 high: 0 medium: 1 low: 0 golang.org/x/net 0.22.0 (golang)

pkg:golang/golang.org/x/net@0.22.0

medium 5.3: CVE--2023--45288 Uncontrolled Resource Consumption

Affected range<0.23.0
Fixed version0.23.0
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

critical: 0 high: 0 medium: 0 low: 0 unspecified: 6stdlib 1.21.7 (golang)

pkg:golang/stdlib@1.21.7

unspecified : CVE--2024--24785

Affected range<1.21.8
Fixed version1.21.8
Description

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

unspecified : CVE--2024--24784

Affected range<1.21.8
Fixed version1.21.8
Description

The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.

unspecified : CVE--2024--24783

Affected range<1.21.8
Fixed version1.21.8
Description

Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic.

This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.

unspecified : CVE--2023--45290

Affected range<1.21.8
Fixed version1.21.8
Description

When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion.

With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.

unspecified : CVE--2023--45289

Affected range<1.21.8
Fixed version1.21.8
Description

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not.

A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

unspecified : CVE--2023--45288

Affected range<1.21.9
Fixed version1.21.9
Description

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames.

Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed.

This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send.

The fix sets a limit on the amount of excess header frames we will process before closing a connection.

Copy link

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/reptyr:0.10.0

📦 Image Reference ghcr.io/uniget-org/tools/reptyr:0.10.0
digestsha256:775a0f4bf60cd6af488365cdcc46530fd5f7e7fb9a250136df24e41b550285ae
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
platformlinux/amd64
size219 kB
packages0

Copy link

Attempting automerge. See https://github.com/uniget-org/tools/actions/runs/8753573557.

Copy link

PR is blocked and can not be merged. See https://github.com/uniget-org/tools/actions/runs/8753573557.

@nicholasdille nicholasdille merged commit 2b84785 into main Apr 19, 2024
40 checks passed
@nicholasdille nicholasdille deleted the curl-create-dirs branch April 19, 2024 12:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant