-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add CVE-2024-34156 to VEX #7478
Comments
@knqyf263 ➜ git checkout v0.55.1
...
HEAD is now at 8c6a4a64c release: v0.55.1 [release/v0.55] (#7491)
➜ go version
go version go1.22.4 darwin/arm64
➜ cat go.mod | grep toolchain
toolchain go1.22.4
➜ govulncheck -format openvex ./...
{
"vulnerability": {
"@id": "https://pkg.go.dev/vuln/GO-2024-3106",
"name": "GO-2024-3106",
"description": "Stack exhaustion in Decoder.Decode in encoding/gob",
"aliases": [
"CVE-2024-34156"
]
},
"products": [
{
"@id": "Unknown Product"
}
],
"status": "affected"
}
IIUC this means one of the child dependencies uses |
If I understand correctly, it's a false positive as commented here. I'm still trying to understand the problem. |
I carefully reviewed it again, but I don't think this vulnerability affects Trivy as we don't use |
Thanks. Can we also suppress CVE-2024-34155 and CVE-2024-34158? |
|
Description
Trivy is not using
encoding/gob
, so CVE-2024-34156 should not affect us. We should update our VEX.To ensure that, we can first run govulncheck and see the result. However, if the local Go version is newer, govulncheck will not detect CVE-2024-34156 in the first place, so we will need to install the affected Go version.
The text was updated successfully, but these errors were encountered: