Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix CVE-2024-45337 - golang.org/x/crypto - loki #15387

Closed
rgoltz opened this issue Dec 12, 2024 · 1 comment
Closed

Fix CVE-2024-45337 - golang.org/x/crypto - loki #15387

rgoltz opened this issue Dec 12, 2024 · 1 comment
Assignees

Comments

@rgoltz
Copy link

rgoltz commented Dec 12, 2024

Is your feature request related to a problem? Please describe.
The current loki docker image might be affected by an possible misuse of ServerConfig.PublicKeyCallback, which may cause authorization bypass in golang.org/x/crypto. This issue (and it's fix in crypto) is assinged to CVE-2024-45337 / GHSA-v778-237x-gjrc.

Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. Since this API is widely misused, as a partial mitigation golang.org/x/[email protected] enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary.

Describe the solution you'd like
Upgrade golang.org/x/crypto to v0.31.0 - hence merging this PRs would be great:

Additional context - Details from Image-Scan

Package Name golang.org/x/crypto
Vulnerability ID https://nvd.nist.gov/vuln/detail/CVE-2024-45337
GitHub Advisory GHSA-v778-237x-gjrc
Severity High
Fix available Yes
Fixed version v0.31.0
Package Manager GOBINARY
File paths usr/bin/loki
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants