Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

updated the versions to fix few CVE's #1208

Closed
wants to merge 3 commits into from

Conversation

junaid18183
Copy link

The current version of sops i.e. 3.7.3 has few CVE's

usr/local/bin/sops (gobinary)
=============================
Total: 4 (HIGH: 4, CRITICAL: 0)
┌───────────────────┬────────────────┬──────────┬────────────────────────────────────┬───────────────────────────────────┬─────────────────────────────────────────────────────────┐
│      Library      │ Vulnerability  │ Severity │         Installed Version          │           Fixed Version           │                          Title                          │
├───────────────────┼────────────────┼──────────┼────────────────────────────────────┼───────────────────────────────────┼─────────────────────────────────────────────────────────┤
│ golang.org/x/net  │ CVE-2022-27664 │ HIGH     │ v0.0.0-20220420153159-1850ba15e1be │ 0.0.0-20220906165146-f3363e06e74c │ handle server errors after sending GOAWAY               │
│                   │                │          │                                    │                                   │ https://avd.aquasec.com/nvd/cve-2022-27664              │
│                   ├────────────────┤          │                                    ├───────────────────────────────────┼─────────────────────────────────────────────────────────┤
│                   │ CVE-2022-41723 │          │                                    │ 0.7.0                             │ avoid quadratic complexity in HPACK decoding            │
│                   │                │          │                                    │                                   │ https://avd.aquasec.com/nvd/cve-2022-41723              │
├───────────────────┼────────────────┤          ├────────────────────────────────────┼───────────────────────────────────┼─────────────────────────────────────────────────────────┤
│ golang.org/x/text │ CVE-2022-32149 │          │ v0.3.7                             │ 0.3.8                             │ golang: golang.org/x/text/language: ParseAcceptLanguage │
│                   │                │          │                                    │                                   │ takes a long time to parse complex tags                 │
│                   │                │          │                                    │                                   │ https://avd.aquasec.com/nvd/cve-2022-32149              │
├───────────────────┼────────────────┤          ├────────────────────────────────────┼───────────────────────────────────┼─────────────────────────────────────────────────────────┤
│ gopkg.in/yaml.v3  │ CVE-2022-28948 │          │ v3.0.0-20210107192922-496545a6307b │ 3.0.0-20220521103104-8f96da9f5d5e │ crash when attempting to deserialize invalid input      │
│                   │                │          │                                    │                                   │ https://avd.aquasec.com/nvd/cve-2022-28948              │
└───────────────────┴────────────────┴──────────┴────────────────────────────────────┴───────────────────────────────────┴─────────────────────────────────────────────────────────┘

I have bumped the versions of the dependencies to get rid of them, tested locally, and everything works fine

Successfully built 9a2caac074db
Successfully tagged junaid18183/sops:3.7.4
[root@ip-172-31-68-221 tmp]# docker run  -it junaid18183/sops:3.7.4 /bin/bash
[root@f89e773f8e77 /]# sops -v
sops 3.7.4 (latest)
[root@f89e773f8e77 /]# exit
exit
[root@ip-172-31-68-221 tmp]# trivy image --security-checks vuln --no-progress --severity "HIGH,CRITICAL" junaid18183/sops:3.7.4
2023-05-10T16:51:37.767Z	WARN	'--security-checks' is deprecated. Use '--scanners' instead.
2023-05-10T16:51:37.777Z	INFO	Vulnerability scanning is enabled
2023-05-10T16:51:44.041Z	INFO	Detected OS: redhat
2023-05-10T16:51:44.041Z	INFO	Detecting RHEL/CentOS vulnerabilities...
2023-05-10T16:51:44.101Z	INFO	Number of language-specific files: 1
2023-05-10T16:51:44.101Z	INFO	Detecting gobinary vulnerabilities...

junaid18183/sops:3.7.4 (redhat 8.7)

Total: 0 (HIGH: 0, CRITICAL: 0)

[root@ip-172-31-68-221 tmp]#

@jrwhite17
Copy link

I'm interested in this PR as well! 👍

@hiddeco
Copy link
Member

hiddeco commented Jul 4, 2023

Addressed via #1147

@hiddeco hiddeco closed this Jul 4, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants