Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: bump up go version to 1.22.7 #2319

Merged
merged 1 commit into from
Nov 20, 2024
Merged

Conversation

afdesk
Copy link
Contributor

@afdesk afdesk commented Nov 20, 2024

Description

This PR fixes CVE-2024-34156, CVE-2024-34155 and CVE-2024-34158 in Go stdlib.

Before:

trivy rootfs .
2024-11-20T13:47:47+06:00	INFO	[vuln] Vulnerability scanning is enabled
2024-11-20T13:47:47+06:00	INFO	[secret] Secret scanning is enabled
2024-11-20T13:47:47+06:00	INFO	[secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-11-20T13:47:47+06:00	INFO	[secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2024-11-20T13:47:47+06:00	INFO	Number of language-specific files	num=1
2024-11-20T13:47:47+06:00	INFO	[gobinary] Detecting vulnerabilities...
2024-11-20T13:47:47+06:00	WARN	Using severities from other vendors for some vulnerabilities. Read https://aquasecurity.github.io/trivy/v0.57/docs/scanner/vulnerability#severity-selection for details.

to (gobinary)

Total: 4 (UNKNOWN: 0, LOW: 1, MEDIUM: 2, HIGH: 1, CRITICAL: 0)

┌──────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬────────────────┬─────────────────────────────────────────────────────────────┐
│           Library            │ Vulnerability  │ Severity │ Status │ Installed Version │ Fixed Version  │                            Title                            │
├──────────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤
│ github.com/golang-jwt/jwt/v4 │ CVE-2024-51744 │ LOW      │ fixed  │ v4.5.0            │ 4.5.1          │ golang-jwt: Bad documentation of error handling in          │
│                              │                │          │        │                   │                │ ParseWithClaims can lead to potentially...                  │
│                              │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-51744                  │
├──────────────────────────────┼────────────────┼──────────┤        ├───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤
│ stdlib                       │ CVE-2024-34156 │ HIGH     │        │ v1.22.6           │ 1.22.7, 1.23.1 │ encoding/gob: golang: Calling Decoder.Decode on a message   │
│                              │                │          │        │                   │                │ which contains deeply nested structures...                  │
│                              │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-34156                  │
│                              ├────────────────┼──────────┤        │                   │                ├─────────────────────────────────────────────────────────────┤
│                              │ CVE-2024-34155 │ MEDIUM   │        │                   │                │ go/parser: golang: Calling any of the Parse functions       │
│                              │                │          │        │                   │                │ containing deeply nested literals...                        │
│                              │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-34155                  │
│                              ├────────────────┤          │        │                   │                ├─────────────────────────────────────────────────────────────┤
│                              │ CVE-2024-34158 │          │        │                   │                │ go/build/constraint: golang: Calling Parse on a "// +build" │
│                              │                │          │        │                   │                │ build tag line with...                                      │
│                              │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-34158                  │
└──────────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴────────────────┴─────────────────────────────────────────────────────────────┘

After:

trivy rootfs .
2024-11-20T13:45:33+06:00	INFO	[vuln] Vulnerability scanning is enabled
2024-11-20T13:45:33+06:00	INFO	[secret] Secret scanning is enabled
2024-11-20T13:45:33+06:00	INFO	[secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-11-20T13:45:33+06:00	INFO	[secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2024-11-20T13:45:33+06:00	INFO	Number of language-specific files	num=1
2024-11-20T13:45:33+06:00	INFO	[gobinary] Detecting vulnerabilities...

to (gobinary)

Total: 1 (UNKNOWN: 0, LOW: 1, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

┌──────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬───────────────┬────────────────────────────────────────────────────┐
│           Library            │ Vulnerability  │ Severity │ Status │ Installed Version │ Fixed Version │                       Title                        │
├──────────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼───────────────┼────────────────────────────────────────────────────┤
│ github.com/golang-jwt/jwt/v4 │ CVE-2024-51744 │ LOW      │ fixed  │ v4.5.0            │ 4.5.1         │ golang-jwt: Bad documentation of error handling in │
│                              │                │          │        │                   │               │ ParseWithClaims can lead to potentially...         │
│                              │                │          │        │                   │               │ https://avd.aquasec.com/nvd/cve-2024-51744         │
└──────────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴───────────────┴────────────────────────────────────────────────────┘

Checklist

  • I've read the guidelines for contributing to this repository.
  • I've added tests that prove my fix is effective or that my feature works.
  • I've updated the documentation with the relevant information (if needed).
  • I've added usage information (if the PR introduces new options)
  • I've included a "before" and "after" example to the description (if the PR is a user interface change).

@github-actions github-actions bot added the misc label Nov 20, 2024
@afdesk afdesk requested a review from simar7 November 20, 2024 07:50
@afdesk afdesk marked this pull request as ready for review November 20, 2024 09:21
@simar7 simar7 merged commit 265309e into aquasecurity:main Nov 20, 2024
10 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants