-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
9-20-24 cve updates #4026
9-20-24 cve updates #4026
Conversation
@@ -23,7 +23,7 @@ input. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images affected will be upgraded to remove the vulnerability. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'deserialize'?
@@ -23,7 +23,7 @@ input. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images affected will be upgraded to remove the vulnerability. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Google.Ordinal] Spell out all ordinal numbers ('3rd') in text.
@@ -14,7 +14,7 @@ tags: ["security", "cve"] | |||
|
|||
## Last Update | |||
|
|||
09/15/2024 | |||
09/20/2024 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/20/2024'.
@@ -24,7 +24,8 @@ service. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and denial-of-service. The vulnerability is caused by a segment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'libtiff'?
@@ -24,7 +24,8 @@ service. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and denial-of-service. The vulnerability is caused by a segment | |||
fault (SEGV) flaw that can be triggered when a crafted TIFF file is passed to the TIFFReadRGBATileExt() API. Investigating a possible fix for this vulnerability on the affected images. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[spectrocloud-docs-internal.acronym] Use title case to define the acronym '(SEGV)'.
@@ -14,7 +14,7 @@ tags: ["security", "cve"] | |||
|
|||
## Last Update | |||
|
|||
09/15/2024 | |||
09/20/2024 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/20/2024'.
@@ -27,7 +27,9 @@ parsed headers. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
This CVE involves excessive memory allocation in net/http and net/textproto, potentially leading to a denial-of-service due to large memory allocation while parsing HTTP and MIME |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Vale.Terms] Use 'HTTP' instead of 'http'.
Investigation is ongoing to determine how this vulnerability affects our products. | ||
This CVE involves excessive memory allocation in net/http and net/textproto, potentially leading to a denial-of-service due to large memory allocation while parsing HTTP and MIME | ||
headers even for small inputs. Attackers can exploit this vulnerability to exhaust an HTTP server's memory resources, causing a denial of service. By crafting specific input data | ||
patterns, an attacker can trigger the excessive memory allocation behavior in the HTTP and MIME header parsing functions, leading to memory exhaustion. The risk of this vulnerability exploited in Spectro Cloud products is very low. 3rd party images affected will be upgraded to remove the vulnerability. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Google.Ordinal] Spell out all ordinal numbers ('3rd') in text.
✅ Deploy Preview for docs-spectrocloud ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
@@ -23,7 +23,9 @@ input. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'Unmarshal'?
@@ -23,7 +23,9 @@ input. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to | |||
convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'deserialize'?
@@ -23,7 +23,9 @@ input. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to | |||
convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Google.Ordinal] Spell out all ordinal numbers ('3rd') in text.
@@ -24,7 +24,10 @@ service. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'libtiff'?
@@ -24,7 +24,10 @@ service. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and | |||
denial-of-service. The vulnerability is caused by a segment fault (SEGV) flaw that can be triggered when a crafted TIFF |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[spectrocloud-docs-internal.acronym] Use title case to define the acronym '(SEGV)'.
@@ -27,7 +27,12 @@ parsed headers. | |||
|
|||
## Our Official Summary | |||
|
|||
Investigation is ongoing to determine how this vulnerability affects our products. | |||
This CVE involves excessive memory allocation in net/http and net/textproto, potentially leading to a denial-of-service |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Vale.Terms] Use 'HTTP' instead of 'http'.
vulnerability to exhaust an HTTP server's memory resources, causing a denial of service. By crafting specific input data | ||
patterns, an attacker can trigger the excessive memory allocation behavior in the HTTP and MIME header parsing | ||
functions, leading to memory exhaustion. The risk of this vulnerability exploited in Spectro Cloud products is very low. | ||
3rd party images affected will be upgraded to remove the vulnerability. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚫 [vale] reported by reviewdog 🐶
[Google.Ordinal] Spell out all ordinal numbers ('3rd') in text.
* 9-20-24 cve updates * ci: auto-formatting prettier issues --------- Co-authored-by: frederickjoi <[email protected]> (cherry picked from commit 2d9cfa7)
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation and see the Github Action logs for details |
* 9-20-24 cve updates * ci: auto-formatting prettier issues --------- Co-authored-by: frederickjoi <[email protected]> (cherry picked from commit 2d9cfa7) Co-authored-by: frederickjoi <[email protected]>
🎉 This issue has been resolved in version 4.5.0 🎉 The release is available on GitHub release Your semantic-release bot 📦🚀 |
Describe the Change
updated official summaries
This PR ....
Changed Pages
💻 Add Preview URL for Page
Jira Tickets
🎫 Jira Ticket
Backports
Can this PR be backported?