Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

9-20-24 cve updates #4026

Merged
merged 2 commits into from
Sep 20, 2024
Merged

9-20-24 cve updates #4026

merged 2 commits into from
Sep 20, 2024

Conversation

frederickjoi
Copy link
Contributor

Describe the Change

updated official summaries

This PR ....

Changed Pages

💻 Add Preview URL for Page

Jira Tickets

🎫 Jira Ticket

Backports

Can this PR be backported?

  • Yes. Remember to add the relevant backport labels to your PR.
  • No. Please leave a short comment below about why this PR cannot be backported.

@@ -23,7 +23,7 @@ input.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images affected will be upgraded to remove the vulnerability.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'deserialize'?

@@ -23,7 +23,7 @@ input.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images affected will be upgraded to remove the vulnerability.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.Ordinal] Spell out all ordinal numbers ('3rd') in text.

@@ -14,7 +14,7 @@ tags: ["security", "cve"]

## Last Update

09/15/2024
09/20/2024
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/20/2024'.

@@ -24,7 +24,8 @@ service.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and denial-of-service. The vulnerability is caused by a segment
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'libtiff'?

@@ -24,7 +24,8 @@ service.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and denial-of-service. The vulnerability is caused by a segment
fault (SEGV) flaw that can be triggered when a crafted TIFF file is passed to the TIFFReadRGBATileExt() API. Investigating a possible fix for this vulnerability on the affected images.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[spectrocloud-docs-internal.acronym] Use title case to define the acronym '(SEGV)'.

@@ -14,7 +14,7 @@ tags: ["security", "cve"]

## Last Update

09/15/2024
09/20/2024
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.DateFormat] Use 'July 31, 2016' format, not '09/20/2024'.

@@ -27,7 +27,9 @@ parsed headers.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
This CVE involves excessive memory allocation in net/http and net/textproto, potentially leading to a denial-of-service due to large memory allocation while parsing HTTP and MIME
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Terms] Use 'HTTP' instead of 'http'.

Investigation is ongoing to determine how this vulnerability affects our products.
This CVE involves excessive memory allocation in net/http and net/textproto, potentially leading to a denial-of-service due to large memory allocation while parsing HTTP and MIME
headers even for small inputs. Attackers can exploit this vulnerability to exhaust an HTTP server's memory resources, causing a denial of service. By crafting specific input data
patterns, an attacker can trigger the excessive memory allocation behavior in the HTTP and MIME header parsing functions, leading to memory exhaustion. The risk of this vulnerability exploited in Spectro Cloud products is very low. 3rd party images affected will be upgraded to remove the vulnerability.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.Ordinal] Spell out all ordinal numbers ('3rd') in text.

Copy link

netlify bot commented Sep 20, 2024

Deploy Preview for docs-spectrocloud ready!

Name Link
🔨 Latest commit c0b7f11
🔍 Latest deploy log https://app.netlify.com/sites/docs-spectrocloud/deploys/66ed7e5574a4710008ee35a4
😎 Deploy Preview https://deploy-preview-4026--docs-spectrocloud.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

@@ -23,7 +23,9 @@ input.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'Unmarshal'?

@@ -23,7 +23,9 @@ input.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to
convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'deserialize'?

@@ -23,7 +23,9 @@ input.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
A flaw was found in the Unmarshal function in Go-Yaml. This vulnerability results in program crashes when attempting to
convert (or deserialize) invalid input data, potentially impacting system stability and reliability. 3rd party images
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.Ordinal] Spell out all ordinal numbers ('3rd') in text.

@@ -24,7 +24,10 @@ service.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Spelling] Did you really mean 'libtiff'?

@@ -24,7 +24,10 @@ service.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
This is a vulnerability in libtiff that can be exploited by a remote attacker to cause a heap-buffer overflow and
denial-of-service. The vulnerability is caused by a segment fault (SEGV) flaw that can be triggered when a crafted TIFF
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[spectrocloud-docs-internal.acronym] Use title case to define the acronym '(SEGV)'.

@@ -27,7 +27,12 @@ parsed headers.

## Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.
This CVE involves excessive memory allocation in net/http and net/textproto, potentially leading to a denial-of-service
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Vale.Terms] Use 'HTTP' instead of 'http'.

vulnerability to exhaust an HTTP server's memory resources, causing a denial of service. By crafting specific input data
patterns, an attacker can trigger the excessive memory allocation behavior in the HTTP and MIME header parsing
functions, leading to memory exhaustion. The risk of this vulnerability exploited in Spectro Cloud products is very low.
3rd party images affected will be upgraded to remove the vulnerability.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 [vale] reported by reviewdog 🐶
[Google.Ordinal] Spell out all ordinal numbers ('3rd') in text.

@karl-cardenas-coding karl-cardenas-coding added auto-backport Enable backport backport-version-4-4 Backport change to version 4.4 labels Sep 20, 2024
@karl-cardenas-coding karl-cardenas-coding merged commit 2d9cfa7 into master Sep 20, 2024
24 checks passed
@karl-cardenas-coding karl-cardenas-coding deleted the 9-20-24-cve-updates branch September 20, 2024 15:17
vault-token-factory-spectrocloud bot pushed a commit that referenced this pull request Sep 20, 2024
* 9-20-24 cve updates

* ci: auto-formatting prettier issues

---------

Co-authored-by: frederickjoi <[email protected]>
(cherry picked from commit 2d9cfa7)
@vault-token-factory-spectrocloud
Copy link
Contributor

💚 All backports created successfully

Status Branch Result
version-4-4

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation and see the Github Action logs for details

vault-token-factory-spectrocloud bot added a commit that referenced this pull request Sep 20, 2024
* 9-20-24 cve updates

* ci: auto-formatting prettier issues

---------

Co-authored-by: frederickjoi <[email protected]>
(cherry picked from commit 2d9cfa7)

Co-authored-by: frederickjoi <[email protected]>
@vault-token-factory-spectrocloud
Copy link
Contributor

🎉 This issue has been resolved in version 4.5.0 🎉

The release is available on GitHub release

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auto-backport Enable backport backport-version-4-4 Backport change to version 4.4 released
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants