-
Notifications
You must be signed in to change notification settings - Fork 512
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump golang 1.12.10 (CVE-2019-9512, CVE-2019-9514, CVE-2019-16276) #1485
Bump golang 1.12.10 (CVE-2019-9512, CVE-2019-9514, CVE-2019-16276) #1485
Conversation
ping @justincormack @HuKeping |
c3d5532
to
6a1bfb6
Compare
CI issue looks like it could be transient - can you try repushing? |
Looks like CodeCov had issues; https://circleci.com/gh/theupdateframework/notary/5567?utm_campaign=vcs-integration-link&utm_medium=referral&utm_source=github-build-link
Seeing networking issues as well; wondering: when you updated to Go 1.12.7 was the image already switched to debian buster? If not, this could be related. I can push a commit to pin it to |
Yes, I'll try a repush first |
6a1bfb6
to
bbe3111
Compare
Oh! failure actually looks because of the Golang change;
There's a trailing |
Ah, yes the parsing changes look like they are going to break a few things... there are more coming in Go 1.14 |
Looks like they had this regression before in Golang; golang/go#12023 |
Well the suggestion in that issue is that DSNs are not necessarily URIs and you shouldn't parse them... |
Need to look where it hits |
Guess it could be in an external binary;
|
Ah; that one has been archived (https://github.com/mattes/migrate/) and has moved to https://github.com/golang-migrate/migrate |
issue now open at golang-migrate/migrate#264 |
New version still has the problem;
|
Should be fixed by golang-migrate/migrate#265 |
1da0d48
to
1cd381f
Compare
rebased |
golang-migrate/migrate#265 was merged, but not yet tagged, pending golang-migrate/migrate#254 (trying to address that with golang-migrate/migrate#270)
|
ec253c6
to
5181f20
Compare
Well, I guess
|
@thaJeztah regarding big images: you can use multi-stage builds to reduce size as described in recent article if it is important 🙂 (oh, you probably already know about it :D) |
99932f1
to
df9654a
Compare
@ernado thanks! Yes, I'm aware of ways to reduce the final image size; the "minimal" Dockerfiles already use multi-stage to reduce the final image size, and for the other Dockerfile, it's not super important (as it's mainly for testing/building locally). It's a pity though that After #1486 is merged, we can make more improvements (such as using Strictly we don't need the fixed version of |
@HuKeping @endophage ptal 🤗 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Thank you @thaJeztah for tracking this !
rebase needed :)
and would you mind if squashing the last two commits, it seems the last but one was broken.
df9654a
to
211715b
Compare
211715b
to
68499d4
Compare
68499d4
to
32adb5c
Compare
CI is currently failing because of #1506 (also see #1505) The reason this was now failing is that However, there was a bug in the makefile, causing that output to not be printed, so I opened a PR to suppress the gosec issue; #1506 That last one currentlyfails, which allows verifying it does what it should do. After #1506 is merged, we can rebase it, and it should go green (to verify it's also doing the right thing if there's no failures 😂 ) |
This was updated to use Go 1.12.10 (which fixes another CVE), and golang-migrate v4.6.2
They were broken when testing with Go > 1.12.8, but worked on Go 1.12.7. I re-ordered the commits so that the Go 1.12 bump is last, which should keep the repository |
Thanks @thaJeztah , let's get to #1505 and #1506 first.
yeahhhhhh, |
Signed-off-by: Sebastiaan van Stijn <[email protected]>
32adb5c
to
dcb9ba7
Compare
signer.Dockerfile
Outdated
|
||
RUN apk add --update git gcc libc-dev | ||
|
||
# Pin to the specific v3.0.0 version | ||
RUN go get -tags 'mysql postgres file' github.com/mattes/migrate/cli && mv /go/bin/cli /go/bin/migrate | ||
ARG MIGRATE_VER=v4.6.0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
missed updating this dockerfile; let me fix that one to be consistent
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done 👍
v4.6.2 - Removed unnecessary debug output - Improved error messages when no migrations are found v4.6.1 - Fix issue parsing MySQL DSNs with custom query parameters v4.6.0 - Updated MongoDB driver to v1.1.0 - Missing migrate CLI commands will now return a non-zero exit - Go 1.12.8 fixed a security issue where invalid URIs were being parsed. The fix broke migrate when used with MySQL. - Update NewDockerContainer in unused/deprecated migrate/testing package . Signed-off-by: Sebastiaan van Stijn <[email protected]>
Bump golang 1.12.10 (CVE-2019-16276) ===================================================== go1.12.10 (released 2019/09/25) includes security fixes to the net/http and net/textproto packages. See the Go 1.12.10 milestone on our issue tracker for details. https://github.com/golang/go/issues?q=milestone%3AGo1.12.10 Bump golang 1.12.9 ===================================================== go1.12.9 (released 2019/08/15) includes fixes to the linker, and the os and math/big packages. See the Go 1.12.9 milestone on our issue tracker for details. https://github.com/golang/go/issues?q=milestone%3AGo1.12.9 Bump golang 1.12.8 (CVE-2019-9512, CVE-2019-9514) ===================================================== go1.12.8 (released 2019/08/13) includes security fixes to the net/http and net/url packages. See the Go 1.12.8 milestone on our issue tracker for details: https://github.com/golang/go/issues?q=milestone%3AGo1.12.8 - net/http: Denial of Service vulnerabilities in the HTTP/2 implementation net/http and golang.org/x/net/http2 servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. Servers will now close connections if the send queue accumulates too many control messages. The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606. Thanks to Jonathan Looney from Netflix for discovering and reporting these issues. This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of golang.org/x/net/http2. net/url: parsing validation issue - url.Parse would accept URLs with malformed hosts, such that the Host field could have arbitrary suffixes that would appear in neither Hostname() nor Port(), allowing authorization bypasses in certain applications. Note that URLs with invalid, not numeric ports will now return an error from url.Parse. The issue is CVE-2019-14809 and Go issue golang.org/issue/29098. Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me) for discovering and reporting this issue. Signed-off-by: Sebastiaan van Stijn <[email protected]>
dcb9ba7
to
868ccd5
Compare
Going to ignore codecov change as this is not actually introducing new code. |
I'll start working on the Go1.12.11 update; which just was released (will probably do a round to a bunch of repositories) |
Bump golang 1.12.10 (CVE-2019-16276)
go1.12.10 (released 2019/09/25) includes security fixes to the net/http and net/textproto
packages. See the Go 1.12.10 milestone on our issue tracker for details.
https://github.com/golang/go/issues?q=milestone%3AGo1.12.10
Bump golang 1.12.9
go1.12.9 (released 2019/08/15) includes fixes to the linker, and the os and math/big packages.
See the Go 1.12.9 milestone on our issue tracker for details.
https://github.com/golang/go/issues?q=milestone%3AGo1.12.9
Bump golang 1.12.8 (CVE-2019-9512, CVE-2019-9514)
go1.12.8 (released 2019/08/13) includes security fixes to the net/http and net/url packages.
See the Go 1.12.8 milestone on our issue tracker for details:
https://github.com/golang/go/issues?q=milestone%3AGo1.12.8
net/http and golang.org/x/net/http2 servers that accept direct connections from untrusted
clients could be remotely made to allocate an unlimited amount of memory, until the program
crashes. Servers will now close connections if the send queue accumulates too many control
messages.
The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.
This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of golang.org/x/net/http2.
net/url: parsing validation issue
suffixes that would appear in neither Hostname() nor Port(), allowing authorization bypasses
in certain applications. Note that URLs with invalid, not numeric ports will now return an error
from url.Parse.
The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me) for discovering
and reporting this issue.
Update and pin golang-migrate to v4.6.2
v4.6.2
v4.6.1
v4.6.0
The fix broke migrate when used with MySQL.
Use golang-migrate/migrate, because mattes/migrate was archived