You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
The vulnerability you have reported (CVE-2020-28928) affects the modernc.org/libc library, which is a transitive dependency of modernc.org/sqlite-v1.21.0. Unfortunately, there is no version of modernc.org/sqlite that includes a fix for this vulnerability.
The suggested fix is to upgrade musl to version 1.2.2-1, 1.2.2-1, or 1.1.16-3+deb9u1. However, this may require changes to your project's build configuration.
Please let me know if you have any further questions.
This vulnerability affects the modernc.org/libc library, which is a transitive dependency of your Temporal project. As mentioned in the details section, the vulnerability is fixed in musl version 1.2.2-1, 1.2.2-1, and 1.1.16-3+deb9u1.
Unfortunately, there isn't a version of modernc.org/sqlite that includes a fixed version of modernc.org/libc. Therefore, you'll need to consider alternative solutions to mitigate this vulnerability:
Upgrade Temporal to a version that uses a patched modernc.org/libc library: If possible, check if a newer Temporal version includes a fixed version of modernc.org/libc.
Manually patch the modernc.org/libc library: This requires advanced knowledge of the library and potential risks.
Use a different SQLite library: If your project allows it, consider using an alternative SQLite library that doesn't depend on modernc.org/libc.
Restrict access to the vulnerable component: If you can isolate the use of the vulnerable component to a specific part of your project, you can restrict access to this component to mitigate the risk.
Please note that these solutions have their own trade-offs and may require further investigation and implementation. You should consult the Temporal documentation and potentially contact their support for guidance on the most appropriate solution for your project.
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
Vulnerable Library - modernc.org/libc-v1.22.3
Library home page: https://proxy.golang.org/modernc.org/libc/@v/v1.22.3.zip
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
Publish Date: 2020-11-24
URL: CVE-2020-28928
CVSS 3 Score Details (5.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-28928
Release Date: 2020-11-24
Fix Resolution: musl - 1.2.2-1,1.2.2-1,1.1.16-3+deb9u1
The text was updated successfully, but these errors were encountered: