-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update bketelsen/crypt to fix CVE-2020-15114. #1049
Conversation
This picks up bketelsen/crypt#10. It doesn't look like they've done a new tag yet, so going to the latest commit (as of 17DEC2020) is about all we can do.
👋 Thanks for contributing to Viper! You are awesome! 🎉 A maintainer will take a look at your pull request shortly. 👀 In the meantime: We are working on Viper v2 and we would love to hear your thoughts about what you like or don't like about Viper, so we can improve or fix those issues. ⏰ If you have a couple minutes, please take some time and share your thoughts: https://forms.gle/R6faU74qPRPAzchZ9 📣 If you've already given us your feedback, you can still help by spreading the news, https://twitter.com/sagikazarmark/status/1306904078967074816 Thank you! ❤️ |
As mentioned in #961 we are waiting for etcd 3.5 to be tagged for proper modules support. |
Thanks for the reply! Just to add some context, keeping this at the older version causes any other repo that uses viper to be flagged by vulnerability scanners as having the jwt-go CVE. |
Yeah, I'm aware. That's actually a false alert, because it's not actually compiled in the final binary. As far as I know 3.5 is pretty close and it'll improve modules support. Unfortunately, the currently it's not that good (and became somewhat worse with the last version) |
Understood. I think it still could be problematic in things further up the dependency hierarchy that do use that codepath and viper at the same time, though.
I'm not sure what the etcd relation is here. I'm sure I'm misunderstanding something though. This PR was simply the result of updating the crypt library then running "go mod tidy". Is there a downside to merging early updates like these rather than waiting? I'm trying to stay in the habit of keeping my projects at zero flagged CVEs, even for false positives like this one. I figure it'll be easier to notice a real one when it happens if I'm at 0, rather than if I have a bunch of false positives to wade through. |
It's twofold:
Agreed. The reason I was holding this back is the one I explained above. I'll look into it again to see if things are better now, but I think without etcd 3.5 modules will not work perfectly.
This is also not going to fly: it's not a tagged version. |
This picks up bketelsen/crypt#10. It doesn't look like they've done
a new tag yet, so going to the latest commit (as of 17DEC2020) is about all we can do.