-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update x/net to resolve CVE-2024-45338 #7964
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #7964 +/- ##
==========================================
- Coverage 82.17% 82.13% -0.04%
==========================================
Files 381 381
Lines 38535 38539 +4
==========================================
- Hits 31666 31655 -11
- Misses 5564 5574 +10
- Partials 1305 1310 +5 |
cmd/protoc-gen-go-grpc/go.mod
Outdated
golang.org/x/sys v0.21.0 // indirect | ||
golang.org/x/text v0.16.0 // indirect | ||
google.golang.org/genproto/googleapis/rpc v0.0.0-20240604185151-ef581f913117 // indirect | ||
golang.org/x/net v0.30.0 // indirect |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Missed this one? For fixing CVE-2024-45338 it would require 0.33.0 or later, even if it is an indirect dependancy.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Alternatively, the google.golang.org/grpc
can be fixed and released first with this same PR (via main /go.mod) and then bump google.golang.org/grpc
in this module to the fixed one...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I didn’t miss this one. However, since this go.mod
uses the latest release and hasn’t replaced it with the current version, it would make more sense to:
- Upgrade the
grpc-go
version in this go.mod once we have a release that includes this PR. - Replace
grpc-go
with the current build, so it consumes the updatedx/net
version. - Upgrade the indirect dependency, though I prefer to avoid upgrading indirect dependencies directly.
So, bottom line I prefer number 1, let me know what you think
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Option 1 is the cleanest, but requires update, release, update, release to fix all.
Option 3 is a shortcut, bypassing unit tests and release processes, requiring just one update + release
Option 2 is somewhere in between above options, not sure if shortcut justifies possible complications because of referencing current (unreleased, untagged) revision.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I chose the second option, even though I assume the use of a stable release was intentional. What do you think?
On second thought, I’m wondering if we should avoid any behavior changes related to this CVE. Perhaps we should stick with option 1, which I assume was the approach chosen by the repository owner.
@TomerJLevy thank you for sending the PR. Looking at the fix and the vulnerability description, the issue was found in the HTML parsing library. gRPC doesn't perform HTML parsing, so I believe we are not be effected. We bump all our dependencies every 6 weeks as part of our release process, this should get fixed as part of that. The next dependency bump will happen in January. I'm closing this PR, please feel free to re-open if you think this needs to be fixed urgently. |
Hi @arjan-bal, I understand that this shouldn’t be directly affected by the CVE, and of course, this upgrade can wait until January alongside other upgrades. However, could you respond to the conversation I had with @stefanb regarding the |
After releasing FYI @dfawley |
GHSA-w32m-9786-jp63
RELEASE NOTES: None