Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix for CVE-2022-1996 (Score: 9.1) #175

Closed
sandramayer2 opened this issue Jun 24, 2022 · 5 comments · Fixed by #184 or #185
Closed

Fix for CVE-2022-1996 (Score: 9.1) #175

sandramayer2 opened this issue Jun 24, 2022 · 5 comments · Fixed by #184 or #185
Labels

Comments

@sandramayer2
Copy link

Hi,
our security scan tool find a possible very high security issue for the CVE-2022-1996.

How it this repository affected?

This affected the go-module emicklei/go-restful for versions before 3.8.0.
In this repository is version 2.9.5 used:

Solution

At the moment there exist already a fix but for the newest version 3.8.0:
Code for the fix: emicklei/go-restful@fd3c327
Issue: emicklei/go-restful#489

Can you please update your Go modules to the newest state to fix this issue?

Best regards
Sandra

@ibihim
Copy link
Collaborator

ibihim commented Jun 28, 2022

This is an indirect dependency that we are pulling in from k8s/apiserver. emicklei/go-restful is used for

package for building REST-style Web Services using Google Go

We don't use that part of the codebase: we are not affected by the vulnerability at all.

We will make a version bump soon, so the alerts will go away.

@ibihim
Copy link
Collaborator

ibihim commented Jun 29, 2022

We updated the kubernetes dependencies. We can't do more than that, but I could imagine that it won't contain the newest fix you are referring to.

I would keep the issue open for 30 days and close it. If there are no other concerns around it.

@Darnesey
Copy link

Darnesey commented Jul 25, 2022

Adding a comment here to express interest in the resolution for this. Do we have any updates on possible version updates for this CVE? I'm curious if the fix requires leveraging the replace directive in the go mod file if simply upgrading the direct dependencies isn't enough.

Also, my company's scanning tool is picking up this CVE as well as one for golang.org/x/crypto (CVE-2022-27191) (High Severity). This also appears to be an indirect dependency, so it's not clear to me whether your service leverages code here that can trigger the ssh crash.

Image version scanned with: kube-rbac-proxy:0.13.0

@ibihim
Copy link
Collaborator

ibihim commented Aug 3, 2022

Hi, I will take a look. We are / were in vacation mode.

@ibihim
Copy link
Collaborator

ibihim commented Aug 8, 2022

Cross referencing this issue as there is a general need to solve CVEs that are unrelated:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
3 participants