-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade goutils
to v1.1.1
to address Security vulnerability
#12219
Comments
goutils
to v1.1.1
to address Security vulnerability
goutils
to v1.1.1
to address Security vulnerabilitygoutils
to v1.1.1
to address Security vulnerability
As far as I can tell, we don't directly use the vulnerable functions anywhere. This vulnerability impacts notifications users who use the It also impacts ApplicationSets users in >=v2.5 who use I think we should upgrade goutils across all currently-supported versions so that our users have access to secure functions. |
Signed-off-by: Jaideep Rao <[email protected]>
* upgrade goutils to v1.1.1 Signed-off-by: Jaideep Rao <[email protected]> * Update go.mod Signed-off-by: Michael Crenshaw <[email protected]> --------- Signed-off-by: Jaideep Rao <[email protected]> Signed-off-by: Michael Crenshaw <[email protected]> Co-authored-by: Michael Crenshaw <[email protected]>
* upgrade goutils to v1.1.1 Signed-off-by: Jaideep Rao <[email protected]> * Update go.mod Signed-off-by: Michael Crenshaw <[email protected]> --------- Signed-off-by: Jaideep Rao <[email protected]> Signed-off-by: Michael Crenshaw <[email protected]> Co-authored-by: Michael Crenshaw <[email protected]>
Thanks @crenshaw-dev |
Fixes will be in 2.3.16, 2.4.22, and 2.5.10. |
Summary
Argo CD v2.6.z has moved up to
goutils v1.1.1
however, previous versions (at least until v2.3.z) are still runninggoutils v1.1.0
This includes (
v2.3.15
,v2.4.21
andv2.5.9
)goutils v1.1.0
is impacted by the following CVE (https://nvd.nist.gov/vuln/detail/CVE-2021-4238) categorized as critical (although snyk categorized it as medium (https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSGOUTILS-3121153))The safest approach is likely to bump up the version of
goutils
tov1.1.1
in all affected versionsMotivation
One of the 2 affected functions from above CVE (
CryptoRandomAlphaNumeric
) forms a dependency for ApplicationSet logic inv2.5.z
. Code path can be traced to said function starting here: https://github.com/argoproj/argo-cd/blob/master/applicationset/utils/utils.go#L23The same function is also consumed within
notifications-engine
inv2.4.z
andv2.3.z
code path can be traced to said function starting here:
https://github.com/argoproj/notifications-engine/blob/master/pkg/templates/service.go#L20
notifications-engine
is also consumed within argo-cd, hence it may be exposed transitivelySee related issue: argoproj/notifications-engine#152
Proposal
Upgrade
goutils
tov1.1.1
in all supported and affected Argo CD versions (v2.3.15
,v2.4.21
andv2.5.9
)The text was updated successfully, but these errors were encountered: