Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added meteor-commit #6397

Merged
merged 2 commits into from
Aug 7, 2024
Merged

Added meteor-commit #6397

merged 2 commits into from
Aug 7, 2024

Conversation

nicholasdille
Copy link
Contributor

No description provided.

Copy link

github-actions bot commented Aug 7, 2024

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/meteor-commit:0.22.0

📦 Image Reference ghcr.io/uniget-org/tools/meteor-commit:0.22.0
digestsha256:1a4175b3533adcd434aa7b1f38c66a9420bf4665c8d7b9b2afdfe815920bbbf6
vulnerabilitiescritical: 1 high: 1 medium: 1 low: 0 unspecified: 2
platformlinux/amd64
size2.1 MB
packages30
critical: 1 high: 1 medium: 1 low: 0 unspecified: 2stdlib 1.22.1 (golang)

pkg:golang/[email protected]

critical : CVE--2024--24790

Affected range>=1.22.0-0
<1.22.4
Fixed version1.22.4
Description

The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.

high : CVE--2024--24791

Affected range>=1.22.0-0
<1.22.5
Fixed version1.22.5
Description

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.

An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

medium : CVE--2024--24789

Affected range>=1.22.0-0
<1.22.4
Fixed version1.22.4
Description

The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.

unspecified : CVE--2024--24788

Affected range>=1.22.0-0
<1.22.3
Fixed version1.22.3
Description

A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.

unspecified : CVE--2023--45288

Affected range>=1.22.0-0
<1.22.2
Fixed version1.22.2
Description

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames.

Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed.

This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send.

The fix sets a limit on the amount of excess header frames we will process before closing a connection.

@nicholasdille nicholasdille merged commit 83b06b2 into main Aug 7, 2024
13 checks passed
@nicholasdille nicholasdille deleted the meteor-commit branch August 7, 2024 06:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant